sulfuric-outgoing-basil.glitch.me Open in urlscan Pro
18.204.114.121  Malicious Activity! Public Scan

URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Submission: On December 08 via manual from PL — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 6 HTTP transactions. The main IP is 18.204.114.121, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is sulfuric-outgoing-basil.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time sulfuric-outgoing-basil.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 18.204.114.121 14618 (AMAZON-AES)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
2 2606:4700:1::... 13335 (CLOUDFLAR...)
6 4
Domain Requested by
2 i.gyazo.com sulfuric-outgoing-basil.glitch.me
1 stackpath.bootstrapcdn.com sulfuric-outgoing-basil.glitch.me
1 ajax.googleapis.com sulfuric-outgoing-basil.glitch.me
1 maxcdn.bootstrapcdn.com sulfuric-outgoing-basil.glitch.me
1 sulfuric-outgoing-basil.glitch.me
6 5

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-03-01 -
2022-02-28
a year crt.sh
upload.video.google.com
GTS CA 1C3
2021-11-08 -
2022-01-31
3 months crt.sh
*.gyazo.com
GeoTrust TLS DV RSA Mixed SHA256 2020 CA-1
2021-03-23 -
2022-04-23
a year crt.sh

This page contains 1 frames:

Primary Page: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Frame ID: 3701B66B077B73E6AE07A399F95A2161
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Microsoft Document

Page Statistics

6
Requests

100 %
HTTPS

75 %
IPv6

4
Domains

5
Subdomains

4
IPs

2
Countries

445 kB
Transfer

652 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request tovavvuildreminown.html
sulfuric-outgoing-basil.glitch.me/
11 KB
12 KB
Document
General
Full URL
https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.204.114.121 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-18-204-114-121.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
b1c0e1e738519cef9a022be7ded71f153745064ad0488291cf0cf66294ca685c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Wed, 08 Dec 2021 10:51:33 GMT
content-type
text/html; charset=utf-8
content-length
11742
x-amz-id-2
PBm9XqjkChIH32WBhX1LrMC4PpcJJJdJ+JQQFuTTtlguKScEa8sHABYgRhakYOeWAKC57BEd5hM=
x-amz-request-id
RTM41BSZ64RT7Q8C
last-modified
Wed, 08 Dec 2021 09:44:59 GMT
etag
"b306e341ebd6e3a2f8b252a45286459c"
cache-control
no-cache
x-amz-version-id
7PxYsKEdWoj47qp3M6DaeS4vWylewkFY
accept-ranges
bytes
server
AmazonS3
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/
141 KB
22 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
Requested by
Host: sulfuric-outgoing-basil.glitch.me
URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://sulfuric-outgoing-basil.glitch.me/
Origin
https://sulfuric-outgoing-basil.glitch.me
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Wed, 08 Dec 2021 10:51:33 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
756
age
9787
cdn-cachedat
08/11/2021 06:00:03
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
cdn-proxyver
1.0
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Jan 2021 22:04:04 GMT
server
cloudflare
cdn-requestpullcode
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/css; charset=utf-8
cdn-cache
HIT
vary
Accept-Encoding
cache-control
public, max-age=31919000
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cdn-requestid
a183b03628c7c3dca7d3c6f14c71d1b7
cf-ray
6ba570700efc59d7-MXP
cdn-requestcountrycode
DE
cdn-status
200
cdn-requestpullsuccess
True
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
84 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Requested by
Host: sulfuric-outgoing-basil.glitch.me
URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://sulfuric-outgoing-basil.glitch.me/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 07 Dec 2021 18:57:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
57264
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/hosted-libraries-pushers
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30028
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="hosted-libraries-pushers"
vary
Accept-Encoding
report-to
{"group":"hosted-libraries-pushers","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/hosted-libraries-pushers"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 07 Dec 2022 18:57:09 GMT
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/
50 KB
15 KB
Script
General
Full URL
https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
Requested by
Host: sulfuric-outgoing-basil.glitch.me
URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://sulfuric-outgoing-basil.glitch.me/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 08 Dec 2021 10:51:33 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
723, 718
age
22513410
cdn-cachedat
2021-03-11 11:57:52
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Jan 2021 22:04:06 GMT
server
cloudflare
cdn-requestpullcode
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
cdn-cache
HIT
vary
Accept-Encoding
cache-control
public, max-age=31919000
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cdn-requestid
48f4598378fe1b699fcee6ac68d6cc25
cf-ray
6ba5706fec314a73-FRA
cdn-requestcountrycode
DE
cdn-requestpullsuccess
True
cc41020ecb5162014937e0d1c83fa617.png
i.gyazo.com/
2 KB
2 KB
Image
General
Full URL
https://i.gyazo.com/cc41020ecb5162014937e0d1c83fa617.png
Requested by
Host: sulfuric-outgoing-basil.glitch.me
URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:1::6813:8f6f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
175986272200fb72da9a598d30016bbda9ddcaa9e6e3f07eb94bc74196d4b805

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://sulfuric-outgoing-basil.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Wed, 08 Dec 2021 10:51:33 GMT
via
1.1 google
cf-cache-status
HIT
age
903567
content-length
1637
server
cloudflare
etag
"cc41"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
https://gyazo.com
cache-control
public, max-age=31536000
access-control-allow-credentials
true
content-dpr
1.000000
x-cache-level
ZS
accept-ranges
bytes
cf-ray
6ba5706ffad22b16-FRA
expires
Thu, 08 Dec 2022 10:51:33 GMT
b308246805567e68aad040e42c453a7f.png
i.gyazo.com/
364 KB
365 KB
Image
General
Full URL
https://i.gyazo.com/b308246805567e68aad040e42c453a7f.png
Requested by
Host: sulfuric-outgoing-basil.glitch.me
URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:1::6813:8f6f , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
318e36178af3cbc9c9fceb6fce191d42483ec70c528b1c600e2c38c72a111637

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://sulfuric-outgoing-basil.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Wed, 08 Dec 2021 10:51:33 GMT
via
1.1 google
cf-cache-status
HIT
age
855802
content-length
372780
server
cloudflare
etag
"b308"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
https://gyazo.com
cache-control
public, max-age=31536000
access-control-allow-credentials
true
content-dpr
1.000000
x-cache-level
ZS
accept-ranges
bytes
cf-ray
6ba570705b8a2b16-FRA
expires
Thu, 08 Dec 2022 10:51:33 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| $ function| jQuery object| bootstrap

1 Cookies

Domain/Path Name / Value
i.gyazo.com/ Name: Gyazo_cfwoker
Value: i

4 Console Messages

Source Level URL
Text
javascript warning URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://sulfuric-outgoing-basil.glitch.me/tovavvuildreminown.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.