routine-diffrence.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Submission: On July 18 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by GTS CA 1D4 on July 10th 2023. Valid for: 3 months.
This is the only time routine-diffrence.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: FR Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
3 | 2600:9000:261... 2600:9000:2611:3600:1e:5470:880:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
unlayer.com
assets.unlayer.com — Cisco Umbrella Rank: 86903 |
225 KB |
1 |
web.app
routine-diffrence.web.app |
2 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | assets.unlayer.com |
routine-diffrence.web.app
|
1 | routine-diffrence.web.app | |
4 | 2 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app GTS CA 1D4 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
assets.unlayer.com Amazon RSA 2048 M02 |
2023-04-22 - 2024-05-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://routine-diffrence.web.app/sourcecode.zip
Frame ID: D295CF66974563D87EA15BF6505DD7EA
Requests: 4 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Payer ou consigner
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
sourcecode.zip
routine-diffrence.web.app/ |
28 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1676150302676-aebd5b1fe-0e52-4589-a6a8-634883c62208.png
assets.unlayer.com/projects/134015/ |
70 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1676150006254-b29c8fb25-8996-4e8a-b418-6e31e35ebfc3.png
assets.unlayer.com/projects/134015/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1676149999070-c95ffa4e6-5cb5-406a-8211-8d81a1383ba6.png
assets.unlayer.com/projects/134015/ |
106 KB 106 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: FR Government (Government)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.unlayer.com
routine-diffrence.web.app
2600:9000:2611:3600:1e:5470:880:93a1
2620:0:890::100
619c1fee48df599a706b6632f3aa1fd0ff03f11099360d222e9b342695517157
8a127630e2c027f7554a1230c692365078a585a7ec7c7e872ffb73d2b0fea3f0
8e58533b29b80bda8910e2581612d7cb412dd5b4064f7e3ce3fae44d08300a8c
cf27a0ae44d231a9e0713b7633944942ddb2d517fcef722954fe98582157c88a