katyomalley.com
Open in
urlscan Pro
103.50.161.232
Malicious Activity!
Public Scan
Submission: On March 21 via automatic, source openphish
Summary
This is the only time katyomalley.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 103.50.161.232 103.50.161.232 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
13 | 104.18.9.148 104.18.9.148 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
24 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
bankofamerica.com
prepaid.bankofamerica.com |
307 KB |
5 |
katyomalley.com
katyomalley.com |
97 KB |
24 | 2 |
Domain | Requested by | |
---|---|---|
13 | prepaid.bankofamerica.com |
katyomalley.com
prepaid.bankofamerica.com |
5 | katyomalley.com |
katyomalley.com
|
24 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
prepaid.bankofamerica.com |
www.bankofamerica.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
prepaid.bankofamerica.com Entrust Certification Authority - L1M |
2020-11-23 - 2021-11-23 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://katyomalley.com/file/hush/h/u/sh/eddcard/Verify/email2.html
Frame ID: FF0B25E24E9C5F991DDEC15066135AC7
Requests: 24 HTTP requests in this frame
Screenshot
Detected technologies
ZURB Foundation (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+foundation[^>"]+css/i
- html /<div [^>]*class="[^"]*(?:small|medium|large)-\d{1,2} columns/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google Tag Manager (Tag Managers) Expand
Detected patterns
- html /googletagmanager\.com\/ns\.html[^>]+><\/iframe>/i
- html /<!-- (?:End )?Google Tag Manager -->/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Bank Of America, N. A.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
email2.html
katyomalley.com/file/hush/h/u/sh/eddcard/Verify/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
prepaid.bankofamerica.com/bundles/foundation/ |
2 KB 846 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
prepaid.bankofamerica.com/bundles/ |
290 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery
prepaid.bankofamerica.com/bundles/ |
103 KB 36 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preventEarlyClickCss
prepaid.bankofamerica.com/bundles/ |
45 B 176 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
preventEarlyClick
prepaid.bankofamerica.com/bundles/ |
271 B 511 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foundation
prepaid.bankofamerica.com/bundles/ |
96 KB 24 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr
prepaid.bankofamerica.com/bundles/ |
11 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Visa
prepaid.bankofamerica.com/bundles/ |
17 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dps
prepaid.bankofamerica.com/bundles/Visa/ |
9 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site.css
katyomalley.com/file/hush/h/u/sh/content/PRC384/CP384-T03-019/_Styles/ |
66 KB 66 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
katyomalley.com/file/hush/h/u/sh/content/PRC384/CP384-T03-019/_Images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
print
prepaid.bankofamerica.com/bundles/css/ |
2 KB 616 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EmailLogo.png
katyomalley.com/file/hush/h/u/sh/content/PRC384/_images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jqueryval
prepaid.bankofamerica.com/bundles/ |
40 KB 11 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VisaBehaviorAnalytics
prepaid.bankofamerica.com/bundles/ |
730 KB 179 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VisaBehaviorAnalyticsIntegration
prepaid.bankofamerica.com/bundles/ |
3 KB 1023 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gtm5445.html
katyomalley.com/file/hush/h/u/www.googletagmanager.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.woff
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Connections.woff
prepaid.bankofamerica.com/content/PRC384/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Bold-webfont.woff
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Connections.ttf
prepaid.bankofamerica.com/content/PRC384/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.ttf
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Bold-webfont.ttf
prepaid.bankofamerica.com/Content/_Fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Regular-webfont.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/content/PRC384/_Fonts/Connections.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Bold-webfont.woff
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/content/PRC384/_Fonts/Connections.ttf
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Regular-webfont.ttf
- Domain
- prepaid.bankofamerica.com
- URL
- https://prepaid.bankofamerica.com/Content/_Fonts/OpenSans-Bold-webfont.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)148 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated object| CultureInfoSettings function| $ function| jQuery function| Globalize function| preventSubmit object| respond object| Foundation object| html5 object| Modernizr function| ChangeCulture function| initializeNavigationButtons function| setFormUrl function| showValidationSummary function| hideValidationSummary function| removeSuccessMessage function| removeWarningMessage function| setModalWindow function| startTrackingAccessToken function| startTrackingSession function| setAccessTokenTimer function| setSessionTimer function| renewAccessToken function| showSessionModal function| clearTimers function| showActionAndMsg function| showInitial function| showExtended function| closeExtended function| showExpired function| showExtensionError function| expireSession function| expireSessionAtServer function| extendSession function| blinkTitle function| stopBlinkingTitle function| visaModalCaller function| setModalHeight function| handleDecrease function| decreaseTop function| squeezScrollArea function| squeezModal function| handleIncrease function| expandModal function| expandScrollArea function| increaseTop function| setReveal function| bindCloseModalEvents function| setModalFocus function| externalLinkModalForm function| formatString object| isMobile function| scrollToFormTop boolean| windowFocused number| sessionTimeout undefined| timerIntervalId undefined| blinkIntervalId undefined| accessTokenTimer string| title object| sessionModal object| sessionAction string| sessionActionInitialText string| sessionActionInitialOnclick object| sessionCancel string| sessionCancelInitialText string| sessionCancelInitialOnclick object| sessionHeading object| sessionClock object| sessionMsg boolean| clickSessionCancel boolean| debugging number| sessionTimeoutTimer object| visaModal undefined| prevHeight undefined| initialScrollAreaHeight undefined| initialModalHeight undefined| window_height undefined| modal_height undefined| scrollAreaHeight number| minScrollAreaHeight number| maxScrollAreaHeight undefined| room undefined| scrollArea number| bottomMargin boolean| decreasing undefined| modal number| currentTop number| minTop number| maxTop function| GlobalAlert function| resizeHeader function| Fingerprint object| dataLayer string| sessionTimingoutHeading string| sessionExtendedHeading string| sessionHasExpired string| sessionExpiredByUser string| okButtonText string| closeButtonText boolean| trackSession string| sessionExpiresIn string| baseUrl string| mvcAction string| mvcController number| fingerprint string| token boolean| SimEnabled object| headers boolean| isAccessTokenRenewCheck number| accessTokenIntervalCall boolean| isVBAEnabled object| clientTimeRenewal number| targetRenewalThreshold function| Noofmonths function| IsPasswordCaseSensitivityCheck function| ReplaceEuroWithUnicode string| currencySymbol boolean| processed object| VAAPConfig object| _0xba89 function| _0xc5a5 object| VAAP object| base64js object| pako function| sha256 function| sha224 function| Fingerprint2 number| MOUSE_MOVE number| MOUSE_UP number| MOUSE_DOWN number| MOUSE_DRAG number| NO_BUTTON function| tryNoCatch function| submitForm function| addVBAToken object| staticVars undefined| input function| vbaSubmitHandler function| initVbaSubmit object| clickedSubmitButton object| formToSubmit object| vbaTimeoutId boolean| formDefaultPrevented boolean| requestIsRunning0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
katyomalley.com
prepaid.bankofamerica.com
prepaid.bankofamerica.com
103.50.161.232
104.18.9.148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