www.woosh.in
Open in
urlscan Pro
198.27.103.131
Malicious Activity!
Public Scan
Effective URL: http://www.woosh.in//wp-content/uploads/@@@@/2020/?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&ra...
Submission: On June 08 via manual from CH
Summary
This is the only time www.woosh.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 103.86.176.160 103.86.176.160 | 133296 (WEBWERKS-...) (WEBWERKS-AS-IN Web Werks India Pvt. Ltd.) | |
3 | 198.27.103.131 198.27.103.131 | 16276 (OVH) (OVH) | |
3 | 1 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u16121757.ct.sendgrid.net |
ASN133296 (WEBWERKS-AS-IN Web Werks India Pvt. Ltd., IN)
PTR: server.webwingdemo.com
ayaengineers.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
woosh.in
www.woosh.in |
63 KB |
1 |
ayaengineers.com
1 redirects
ayaengineers.com |
691 B |
1 |
sendgrid.net
1 redirects
u16121757.ct.sendgrid.net |
278 B |
3 | 3 |
Domain | Requested by | |
---|---|---|
3 | www.woosh.in |
www.woosh.in
|
1 | ayaengineers.com | 1 redirects |
1 | u16121757.ct.sendgrid.net | 1 redirects |
3 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.woosh.in//wp-content/uploads/@@@@/2020/?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=takahiro.kosaka@ubs.com&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 420DBF148BD0CC29AC2B0AE070960B8D
Requests: 3 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePe5EbM-2FnGZ9zZd6Shpe86Bl-2BfgU2b0Q0GPixXHJ...
HTTP 302
https://ayaengineers.com/uploads/@@/redirect/?email=takahiro.kosaka@ubs.com HTTP 302
http://www.woosh.in//wp-content/uploads/@@@@/2020/?rand=13InboxLightaspxn.1774256418&fid.4.12528... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u16121757.ct.sendgrid.net/ls/click?upn=34deDdOZ535kuVXPZXIePe5EbM-2FnGZ9zZd6Shpe86Bl-2BfgU2b0Q0GPixXHJsNrZAovWISw7gfIrMs6JqTmefnfOdRmPjQb6ZvfYT17AcgLbskhNQmkEk5p7OClMnOPgQ-wQj_Fr6YEamdg2d1NiKETdJf448TX18qEFCU60KZsyothWrTZdQbsAuWMY6wINpe5hT-2BZwMbZle7625ScA2XqWdcNlhJTMOKCrND0MTOPVnPSF4mZmDXJV5nUnJZwjcq3MzoJvosSrm-2BYw-2BRDRPGAt548prQGi9mgNXAsWVPbu0ou70yB5unpzsw4-2FTIZzw3DMWdmyZaqKBcEuKlpGPn-2FDAGr-2BkrJlKyzcjuIQwRmWt6pBo-3D
HTTP 302
https://ayaengineers.com/uploads/@@/redirect/?email=takahiro.kosaka@ubs.com HTTP 302
http://www.woosh.in//wp-content/uploads/@@@@/2020/?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=takahiro.kosaka@ubs.com&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.woosh.in//wp-content/uploads/@@@@/2020/ Redirect Chain
|
15 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
www.woosh.in//wp-content/uploads/@@@@/2020/files/ |
21 KB 21 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
excel.gif
www.woosh.in//wp-content/uploads/@@@@/2020/files/ |
27 KB 27 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| login0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ayaengineers.com
u16121757.ct.sendgrid.net
www.woosh.in
103.86.176.160
167.89.123.16
198.27.103.131
87c19a14a4a7e908b3492d52bf8c41afa38ff454e8f93410b7612a1697331591
a6502cd41f601526709f72c94ca0efc73e4138c4e56736a23f1f32f6ffcf5e23
afaa0ca8809e6f4160ad273516f7728e9d3a447f4f4b3cfa28bbefeb682ee0c4