www.cmanextstep.com Open in urlscan Pro
2606:4700:3037::6818:77b9  Malicious Activity! Public Scan

URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Submission: On April 18 via automatic, source openphish

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 2606:4700:3037::6818:77b9, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.cmanextstep.com.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 30th 2020. Valid for: 8 months.
This is the only time www.cmanextstep.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
4 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.12.193 54113 (FASTLY)
1 104.16.2.35 13335 (CLOUDFLAR...)
6 3
Apex Domain
Subdomains
Transfer
4 cmanextstep.com
www.cmanextstep.com
4 KB
2 imgur.com
i.imgur.com
i.stack.imgur.com
276 KB
6 2
Domain Requested by
4 www.cmanextstep.com www.cmanextstep.com
1 i.stack.imgur.com www.cmanextstep.com
1 i.imgur.com www.cmanextstep.com
6 3

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-01-30 -
2020-10-09
8 months crt.sh
*.imgur.com
DigiCert SHA2 Secure Server CA
2020-01-15 -
2022-03-16
2 years crt.sh
i.stack.imgur.com
DigiCert SHA2 Secure Server CA
2018-10-16 -
2020-11-25
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Frame ID: AB9A30B21A4B86B91C35EACD1FAC3511
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

6
Requests

100 %
HTTPS

33 %
IPv6

2
Domains

3
Subdomains

3
IPs

2
Countries

280 kB
Transfer

285 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.cmanextstep.com/strap/ht/
8 KB
3 KB
Document
General
Full URL
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bc2db292585e56edffa22382839c8511d5cb736de3909bcc34d7f6423ace03c

Request headers

:method
GET
:authority
www.cmanextstep.com
:scheme
https
:path
/strap/ht/?email=michael.murray@dynata.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Sat, 18 Apr 2020 00:35:57 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=da801e2bfc2f70e79bccd7b35a506ab8e1587170156; expires=Mon, 18-May-20 00:35:56 GMT; path=/; domain=.cmanextstep.com; HttpOnly; SameSite=Lax; Secure
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
585a4f070e9fbebf-FRA
content-encoding
br
cf-request-id
022c4fb8640000bebf5202e200000001
jquery.js
www.cmanextstep.com/strap/ht/js/
0
0
Script
General
Full URL
https://www.cmanextstep.com/strap/ht/js/jquery.js
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 00:36:00 GMT
cf-cache-status
BYPASS
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
status
404
cache-control
no-transform, no-cache, no-store, must-revalidate
cf-ray
585a4f0a4fedbebf-FRA
link
<https://www.cmanextstep.com/wp-json/>; rel="https://api.w.org/"
cf-request-id
022c4fba6f0000bebf52040200000001
expires
Wed, 11 Jan 1984 05:00:00 GMT
vofCsbF.jpg
i.imgur.com/
2 KB
2 KB
Image
General
Full URL
https://i.imgur.com/vofCsbF.jpg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.193 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
11ea121407753d8dde37c8bef8f75ae33f377ca071e047faab7ffe53f66e2281

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 00:35:57 GMT
age
849688
x-cache
HIT, HIT
status
200
content-length
1860
x-served-by
cache-bwi5142-BWI, cache-fra19141-FRA
last-modified
Wed, 08 Apr 2020 04:33:31 GMT
server
cat factory 1.0
x-timer
S1587170157.250383,VS0,VE1
etag
"7149ee0eeddd419b1ccda377ca4ed763"
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
x-cache-hits
1, 1
ms-logo-v1%20copy.svg
www.cmanextstep.com/wp-content/uploads/
756 B
557 B
Image
General
Full URL
https://www.cmanextstep.com/wp-content/uploads/ms-logo-v1%20copy.svg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 00:35:57 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 08 Apr 2020 04:55:23 GMT
server
cloudflare
age
54546
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding,User-Agent
content-type
image/svg+xml
status
200
cache-control
public, max-age=16070400
cf-ray
585a4f0af834bebf-FRA
cf-request-id
022c4fbadd0000bebf52042200000001
expires
Sun, 17 May 2020 09:26:51 GMT
email-decode.min.js
www.cmanextstep.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
870 B
Script
General
Full URL
https://www.cmanextstep.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 00:35:57 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Tue, 14 Apr 2020 14:46:15 GMT
server
cloudflare
etag
W/"5e95ccb7-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
585a4f0ae82ebebf-FRA
cf-request-id
022c4fbad40000bebf52041200000001
expires
Mon, 20 Apr 2020 00:35:57 GMT
vzbuQ.jpg
i.stack.imgur.com/
273 KB
274 KB
Image
General
Full URL
https://i.stack.imgur.com/vzbuQ.jpg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.2.35 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 00:36:00 GMT
cf-cache-status
HIT
age
338935
status
200
content-type
image/jpeg
content-length
279841
cf-request-id
022c4fc66c00002d339503a200000001
last-modified
Sun, 17 Jun 2018 23:41:30 GMT
server
cloudflare
etag
"bcc8c3add31d42b2c4b6d13c0db8d3a5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-amz-version-id
V.CiiONugOFcBvoHG0Y85bcKnjQRsbB5
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
585a4f1d7fb02d33-TXL
expires
Tue, 16 Apr 2030 00:36:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

1 Cookies

Domain/Path Name / Value
.cmanextstep.com/ Name: __cfduid
Value: da801e2bfc2f70e79bccd7b35a506ab8e1587170156