rgre.ml
Open in
urlscan Pro
2606:4700:3037::6818:797b
Malicious Activity!
Public Scan
Effective URL: https://rgre.ml/%23$%25%5e&*&%5e%25/Login.php?sslchannel=true
Submission: On March 16 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 12th 2020. Valid for: 7 months.
This is the only time rgre.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Box.com (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 2606:4700:303... 2606:4700:3037::6818:797b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:197::3114 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2606:4700:20:... 2606:4700:20::681a:56c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE) | |
17 | 4 |
ASN20940 (AKAMAI-ASN1, US)
store-images.s-microsoft.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
rgre.ml
1 redirects
rgre.ml |
186 KB |
2 |
gstatic.com
fonts.gstatic.com |
45 KB |
1 |
pngimg.com
pngimg.com |
33 KB |
1 |
s-microsoft.com
store-images.s-microsoft.com |
5 KB |
17 | 4 |
Domain | Requested by | |
---|---|---|
14 | rgre.ml |
1 redirects
rgre.ml
|
2 | fonts.gstatic.com |
rgre.ml
|
1 | pngimg.com |
rgre.ml
|
1 | store-images.s-microsoft.com |
rgre.ml
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-03-12 - 2020-10-09 |
7 months | crt.sh |
store-images.microsoft.com Microsoft IT TLS CA 4 |
2020-01-03 - 2022-01-03 |
2 years | crt.sh |
*.google.com GTS CA 1O1 |
2020-02-25 - 2020-05-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rgre.ml/%23$%25%5e&*&%5e%25/Login.php?sslchannel=true
Frame ID: 1724965A112B2D1548417474AA20E299
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://rgre.ml/%23%24%25%5E%26*%26%5E%25
HTTP 301
https://rgre.ml/%23$%25%5e&*&%5e%25/ Page URL
- https://rgre.ml/%23$%25%5e&*&%5e%25/Login.php?sslchannel=true Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rgre.ml/%23%24%25%5E%26*%26%5E%25
HTTP 301
https://rgre.ml/%23$%25%5e&*&%5e%25/ Page URL
- https://rgre.ml/%23$%25%5e&*&%5e%25/Login.php?sslchannel=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://rgre.ml/%23%24%25%5E%26*%26%5E%25 HTTP 301
- https://rgre.ml/%23$%25%5e&*&%5e%25/
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
rgre.ml/%23$%25%5e&*&%5e%25/ Redirect Chain
|
113 B 260 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
Login.php
rgre.ml/%23$%25%5e&*&%5e%25/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_yXMMnLSSpPunfPzrxqTY5Fxi0thyZrjewLEjqduzimc.css
rgre.ml/%23$%25%5e&*&%5e%25/assets/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_whE_FIKmCdJjmQukMY5DBbmkss9qZjXENYcyIcR-90c.css
rgre.ml/%23$%25%5e&*&%5e%25/assets/css/ |
18 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
rgre.ml/%23$%25%5e&*&%5e%25/assets/css/ |
4 KB 590 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_7jDhC7Vm4-oxtUbtZMHwD8LA2Gp2KNpvOzvod9283FA.css
rgre.ml/%23$%25%5e&*&%5e%25/assets/css/ |
202 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apps.25144.13510798887489353.ba91417f-f0d9-447e-8437-1c100c23ade6.096b3123-c50e-4942-be9b-cb16e629d4de
store-images.s-microsoft.com/image/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email_PNG20.png
pngimg.com/uploads/email/ |
32 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AstraZeneca_0.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PG_433x90.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GE.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Nationwide.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Boston.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Pandora.png
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home_masthead_ipadonly.jpg
rgre.ml/%23$%25%5e&*&%5e%25/assets/img/ |
84 KB 84 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v14/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Box.com (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rgre.ml/ | Name: PHPSESSID Value: 9b128ea993ded74e31ca3d42e1c778b9 |
|
.rgre.ml/ | Name: __cfduid Value: d9dca6223ab2dd48914ebee36e25ae98e1584380638 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.gstatic.com
pngimg.com
rgre.ml
store-images.s-microsoft.com
2606:4700:20::681a:56c
2606:4700:3037::6818:797b
2a00:1450:4001:81d::2003
2a02:26f0:6c00:197::3114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