www.ronaldjamesgroup.co
Open in
urlscan Pro
74.220.219.126
Malicious Activity!
Public Scan
Submission Tags: @jcybersec_
Submission: On July 05 via api from GB
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 15th 2020. Valid for: 3 months.
This is the only time www.ronaldjamesgroup.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Adobe (Consumer) Generic Email (Online) Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 74.220.219.126 74.220.219.126 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
10 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box526.bluehost.com
www.ronaldjamesgroup.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
ronaldjamesgroup.co
www.ronaldjamesgroup.co |
209 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.ronaldjamesgroup.co |
www.ronaldjamesgroup.co
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ronaldjamesgroup.co Let's Encrypt Authority X3 |
2020-06-15 - 2020-09-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/viewer.php
Frame ID: 9A9DA21C2E0306F11EF559BD436AF928
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
viewer.php
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/ |
20 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adb.js
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pencil.svg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/icons/ |
181 B 320 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data-transfer-download.svg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/icons/ |
195 B 334 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
print.svg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/icons/ |
314 B 453 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fullscreen-exit.svg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/icons/ |
239 B 378 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pdf-logo.png
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/ |
31 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
100Secure.jpg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/ |
148 KB 148 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smallpdf.png
www.ronaldjamesgroup.co/wp-content/uploads/2020/AdobePDF/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Adobe (Consumer) Generic Email (Online) Excel / PDF download (Online)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt function| validateForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.ronaldjamesgroup.co
74.220.219.126
194080ce8a699620a866e554a4bffcdc79a69a98180cd108cd480f24c82973a8
2f71bea7601b970d07eea91af38bcee8b1c9fc197b5f85cbe9bae3b9f2b705c5
328df31e790611695e10d2ea95fb0310598dddb748a0a0bdc2bb18e984109070
401e081099f6016446889f05c2092598ab921bf3257da2458aff51baa228e61f
5922c8a9a7ad935f6eec4d7d3a523061f63144d4ce3ecf5dcaa80aac86158729
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8
cf47dd71a230a784e848996d3d034626c87342322b5d1cac5a2984862b66d44f
d49a2edba304e4d2269ba1c17c6a80e2b87e87c651d67018d58acdbaa72286d9
d5a135bd47b11881dc1a223ea1ea946e6ca5e7cb3b1af58eef8629ea017dbd4e
d7c1fe2997b9a4ef9eb9a84a7c69b0a8f7cec33252e0519924dbe9ffc3ed1bc7