b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com
Open in
urlscan Pro
52.219.177.42
Malicious Activity!
Public Scan
Effective URL: https://b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com/gen.html
Submission: On March 12 via manual from US — Scanned from US
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on February 8th 2024. Valid for: a year.
This is the only time b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 172.66.40.88 172.66.40.88 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 1 | 152.89.61.240 152.89.61.240 | 30860 (YURTEH-AS) (YURTEH-AS) | |
1 | 52.219.177.42 52.219.177.42 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
3 | 2606:4700:303... 2606:4700:3030::6815:1c7b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 5 |
ASN16509 (AMAZON-02, US)
PTR: s3-r-w.us-east-2.amazonaws.com
b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 228 |
46 KB |
3 |
triviaf.ru
cdn.triviaf.ru |
1 MB |
3 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 760 |
89 KB |
1 |
amazonaws.com
b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com |
943 B |
1 |
okpromt.com
1 redirects
www.okpromt.com |
230 B |
1 |
campaign-statistics.com
1 redirects
campaign-statistics.com — Cisco Umbrella Rank: 165018 |
759 B |
0 |
msftauth.net
Failed
aadcdn.msftauth.net Failed |
|
0 |
msauth.net
Failed
aadcdn.msauth.net Failed |
|
15 | 8 |
Domain | Requested by | |
---|---|---|
3 | cdnjs.cloudflare.com |
cdn.triviaf.ru
|
3 | cdn.triviaf.ru |
code.jquery.com
cdn.triviaf.ru |
3 | code.jquery.com |
b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com
cdn.triviaf.ru |
1 | b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com | |
1 | www.okpromt.com | 1 redirects |
1 | campaign-statistics.com | 1 redirects |
0 | aadcdn.msftauth.net Failed |
cdn.triviaf.ru
|
0 | aadcdn.msauth.net Failed |
cdn.triviaf.ru
|
15 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.us-east-2.amazonaws.com Amazon RSA 2048 M01 |
2024-02-08 - 2025-02-03 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
triviaf.ru GTS CA 1P5 |
2024-03-02 - 2024-05-31 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com/gen.html
Frame ID: 298E3229BAB31F7472F79CE5FE89C3BE
Requests: 19 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://campaign-statistics.com/link_click/ODQJBme7yo_NcFtX/22e0ea1236db29f11ee5970fcc1e783c
HTTP 302
https://www.okpromt.com/?utm_source=newsletter&utm_medium=email&utm_campaign=Statewide+Tornado+Drill... HTTP 302
https://b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com/gen.html Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://campaign-statistics.com/link_click/ODQJBme7yo_NcFtX/22e0ea1236db29f11ee5970fcc1e783c
HTTP 302
https://www.okpromt.com/?utm_source=newsletter&utm_medium=email&utm_campaign=Statewide+Tornado+Drill+-+How+can+we+participate&sender_ctype=email&sender_campaign=elmn26&sender_customer=zvAy5Q5 HTTP 302
https://b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com/gen.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
gen.html
b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com/ Redirect Chain
|
549 B 943 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
cdn.triviaf.ru/ |
20 KB 9 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.2.0/ |
59 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js.php
cdn.triviaf.ru/attachment/ |
21 KB 9 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
cdn.triviaf.ru/attachment/ |
2 MB 1 MB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.2.0/ |
59 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_call_c2616792e1950f83fdef6e72dab97293.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
756 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
899 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg
- Domain
- aadcdn.msftauth.net
- URL
- https://aadcdn.msftauth.net/shared/1.0/content/images/picker_verify_call_c2616792e1950f83fdef6e72dab97293.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| b string| u string| url function| a0_0x1d1f function| a0_0x4b8069 function| loadScript function| _0x1db969 function| a0_0x27f8 object| CryptoJS function| a0_0x3c87 function| a0_0x20039a string| caffeine string| ur function| Caffeine function| a0_0x5650 object| script function| _0x332de30 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msftauth.net
b8u1x17xse1em6eu1.s3.us-east-2.amazonaws.com
campaign-statistics.com
cdn.triviaf.ru
cdnjs.cloudflare.com
code.jquery.com
www.okpromt.com
aadcdn.msauth.net
aadcdn.msftauth.net
152.89.61.240
172.66.40.88
2606:4700:3030::6815:1c7b
2606:4700::6811:180e
2a04:4e42:600::649
52.219.177.42
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
36bb5f9c7c45d448e2958393fdc9df9365fd6009e7e2425365d22a9f40d8597d
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
769a555de553babc35a3338f344dd7aa16260c93cea2c7db290707c90484e7cc
77dd5a11e6f1e1bc06009fac032144336cc467cab386d6a249dcec3023f81498
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
929022767fa7a569215d5e52a35e55651b81f6434ba265d80d967e3e5dcd453e
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2
ef6851de75cc1ea2c21095f1d76e26e356f8da988c312b7cac2e2029d035abec