choicesstories-hack2019.club
Open in
urlscan Pro
2606:4700:3037::681c:1e55
Malicious Activity!
Public Scan
Effective URL: https://choicesstories-hack2019.club/wetran/?email=pr%40errp.com
Submission: On March 05 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on July 14th 2019. Valid for: a year.
This is the only time choicesstories-hack2019.club was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:1450:400... 2a00:1450:4001:80b::2010 | 15169 (GOOGLE) (GOOGLE) | |
4 | 2606:4700:303... 2606:4700:3037::681c:1e55 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2 |
ASN15169 (GOOGLE, US)
storage.googleapis.com |
ASN13335 (CLOUDFLARENET, US)
choicesstories-hack2019.club |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
choicesstories-hack2019.club
choicesstories-hack2019.club |
287 KB |
1 |
googleapis.com
storage.googleapis.com |
901 B |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | choicesstories-hack2019.club |
storage.googleapis.com
choicesstories-hack2019.club |
1 | storage.googleapis.com | |
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.storage.googleapis.com GTS CA 1O1 |
2020-02-12 - 2020-05-06 |
3 months | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-07-14 - 2020-07-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://choicesstories-hack2019.club/wetran/?email=pr%40errp.com
Frame ID: DDE18DF05E433E240254ECE8A6DBA127
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://storage.googleapis.com/wetransdowload/wetra.htm?email=pr%40errp.com Page URL
- https://choicesstories-hack2019.club/wetran/?email=pr%40errp.com Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://storage.googleapis.com/wetransdowload/wetra.htm?email=pr%40errp.com Page URL
- https://choicesstories-hack2019.club/wetran/?email=pr%40errp.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
wetra.htm
storage.googleapis.com/wetransdowload/ |
602 B 901 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
choicesstories-hack2019.club/wetran/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
choicesstories-hack2019.club/wetran/files/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.png
choicesstories-hack2019.club/wetran/ |
247 KB 247 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sub.png
choicesstories-hack2019.club/wetran/files/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| login1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.choicesstories-hack2019.club/ | Name: __cfduid Value: dc46b98527973c2d30b4324551ac1f66e1583395457 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
choicesstories-hack2019.club
storage.googleapis.com
2606:4700:3037::681c:1e55
2a00:1450:4001:80b::2010
038c210e54b2e7407ec051bb2985855afcc56f4c99557d0177d9edbd48beaf45
0f87d89d71f89ec01e907d372c2adb506a1b99bead90dbb88cde0df013bbab5f
72d11555972a6f3b75c19057d0fb0013ea2bb592b6a011e79ed87afcbd2bbfe6
ccba188689a7518a9ab0804c9294c1eca13d0c9322413897823e28bae4a073b9
f41a60b7606cd02e88741502f17c6bd48cfb084c9c01dc3d9cf4a1cc743e6bd9