aliados.plan.org.ec
Open in
urlscan Pro
192.185.16.150
Malicious Activity!
Public Scan
Effective URL: https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/cat75ehdyo1n2uymdyh98s3q.php??&93353519575&933535...
Submission Tags: falconsandbox
Submission: On June 09 via api from US
Summary
TLS certificate: Issued by R3 on May 15th 2021. Valid for: 3 months.
This is the only time aliados.plan.org.ec was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 12 | 192.185.16.150 192.185.16.150 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
12 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: spa.spacanada.org
aliados.plan.org.ec |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
plan.org.ec
3 redirects
aliados.plan.org.ec |
313 KB |
0 |
cloudflare.com
Failed
cdnjs.cloudflare.com Failed |
|
0 |
googleapis.com
Failed
fonts.googleapis.com Failed ajax.googleapis.com Failed |
|
12 | 3 |
Domain | Requested by | |
---|---|---|
12 | aliados.plan.org.ec |
3 redirects
aliados.plan.org.ec
|
0 | ajax.googleapis.com Failed |
aliados.plan.org.ec
|
0 | cdnjs.cloudflare.com Failed |
aliados.plan.org.ec
|
0 | fonts.googleapis.com Failed |
aliados.plan.org.ec
|
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.intranet.plan.org.ec R3 |
2021-05-15 - 2021-08-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/cat75ehdyo1n2uymdyh98s3q.php??&93353519575&93353519575&93353519575&email=[email]&93353519575&93353519575&93353519575
Frame ID: 952369C8E6DA7BAD656550EABAD168C7
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/index.php?email=%5Bemail%5D
HTTP 302
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==?%20&88313428946&88313428946&8... HTTP 301
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/?%20&88313428946&88313428946&... HTTP 302
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/cat75ehdyo1n2uymdyh98s3q.php?... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/index.php?email=%5Bemail%5D
HTTP 302
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==?%20&88313428946&88313428946&88313428946&email=[email]&88313428946&88313428946&88313428946 HTTP 301
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/?%20&88313428946&88313428946&88313428946&email=[email]&88313428946&88313428946&88313428946 HTTP 302
https://aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/cat75ehdyo1n2uymdyh98s3q.php??&93353519575&93353519575&93353519575&email=[email]&93353519575&93353519575&93353519575 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
cat75ehdyo1n2uymdyh98s3q.php
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
36 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lg_211.png
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
44 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Captures.PNG
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
MaskedPassword.js
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
0 10 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
css
fonts.googleapis.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lg_212.png
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
54 KB 55 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2222.png
aliados.plan.org.ec/doc/PDF2019AUTOEDITED/T0Rnek1UTTBNamc1TkRZPQ==/files/ |
167 KB 168 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-ui.min.js
ajax.googleapis.com/ajax/libs/jqueryui/1.11.2/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.googleapis.com
- URL
- http://fonts.googleapis.com/css?family=Roboto:400,100
- Domain
- cdnjs.cloudflare.com
- URL
- http://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js
- Domain
- ajax.googleapis.com
- URL
- http://ajax.googleapis.com/ajax/libs/jqueryui/1.11.2/jquery-ui.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer) Generic (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| MaskedPassword function| MM_findObj function| MM_validateForm1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
aliados.plan.org.ec/ | Name: PHPSESSID Value: cedf221991911034f9633794fe6e0eaf |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
aliados.plan.org.ec
cdnjs.cloudflare.com
fonts.googleapis.com
ajax.googleapis.com
cdnjs.cloudflare.com
fonts.googleapis.com
192.185.16.150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