ronku-exe-gonficonfigg.herokuapp.com
Open in
urlscan Pro
54.73.53.134
Malicious Activity!
Public Scan
Effective URL: https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942?&cmd=login_submit&id=1961104464.2331398&session=487f7b22f68312d2c1bbc93b1aea445...
Submission: On February 24 via manual from IT — Scanned from IT
Summary
TLS certificate: Issued by Amazon on June 1st 2021. Valid for: a year.
This is the only time ronku-exe-gonficonfigg.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 54.73.53.134 54.73.53.134 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2606:4700::68... 2606:4700::6810:5514 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:82b::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-73-53-134.eu-west-1.compute.amazonaws.com
ronku-exe-gonficonfigg.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 197 |
19 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 250 |
60 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 401 |
48 KB |
2 |
herokuapp.com
ronku-exe-gonficonfigg.herokuapp.com |
15 KB |
1 |
firebaseapp.com
kiwiapptiwiz.firebaseapp.com |
88 KB |
13 | 5 |
Domain | Requested by | |
---|---|---|
6 | cdnjs.cloudflare.com |
ronku-exe-gonficonfigg.herokuapp.com
|
2 | ajax.googleapis.com |
ronku-exe-gonficonfigg.herokuapp.com
|
2 | cdn.jsdelivr.net |
ronku-exe-gonficonfigg.herokuapp.com
|
2 | ronku-exe-gonficonfigg.herokuapp.com |
ronku-exe-gonficonfigg.herokuapp.com
|
1 | kiwiapptiwiz.firebaseapp.com |
ronku-exe-gonficonfigg.herokuapp.com
|
13 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.herokuapp.com Amazon |
2021-06-01 - 2022-06-30 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-03 - 2022-07-02 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-07 - 2022-05-02 |
3 months | crt.sh |
firebaseapp.com GTS CA 1D4 |
2022-01-31 - 2022-05-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942?&cmd=login_submit&id=1961104464.2331398&session=487f7b22f68312d2c1bbc93b1aea445b487f7b22f68312d2c1bbc93b1aea445b
Frame ID: 36CECBC8D30FA80B3ECA5B5D240B5513
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Webmail Login.Page URL History Show full URLs
- https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942 Page URL
- https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942?&cmd=login_submit&id=1961104464.2331398&session=487f7b22f68... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Heroku (PaaS) Expand
Detected patterns
- \.herokuapp\.com
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942 Page URL
- https://ronku-exe-gonficonfigg.herokuapp.com/84942-8494284942?&cmd=login_submit&id=1961104464.2331398&session=487f7b22f68312d2c1bbc93b1aea445b487f7b22f68312d2c1bbc93b1aea445b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
84942-8494284942
ronku-exe-gonficonfigg.herokuapp.com/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
md5.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.9-1/ |
9 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
84942-8494284942
ronku-exe-gonficonfigg.herokuapp.com/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.0.0/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
md5.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/3.1.9-1/ |
9 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
kiwiapptiwiz.firebaseapp.com/zcxbnjykjbfzxsa/themes/imgs/ |
91 KB 88 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| CryptoJS function| $ function| jQuery boolean| loading string| href object| regex undefined| md5 function| submit function| fetchMX function| send0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
kiwiapptiwiz.firebaseapp.com
ronku-exe-gonficonfigg.herokuapp.com
2606:4700::6810:125e
2606:4700::6810:5514
2620:0:890::100
2a00:1450:4001:82b::200a
54.73.53.134
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
22236f16b68e0a8108921ff2d5118bc93e12127bf436c0fc3d2a29e2f21ad757
5955910e789eae406dda02f4934d87ce5fcad4d41aa0fe61c3ad63980b0d53a9
7633b7c0c97d19e682feee8afa2738523fcb2a14544a550572caeecd2eefe66b
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
80d0635fe9783bec07a43419deb4e9969bf30a78f008386826c9723b7651f43c
97dc67431dbd3360ea838fecad611a30f540f8389bbd15b89a1e14ba8dbb54aa