firebasestorage.googleapis.com
Open in
urlscan Pro
2a00:1450:4001:81e::200a
Malicious Activity!
Public Scan
Effective URL: https://firebasestorage.googleapis.com/v0/b/teamdinero-a1587.appspot.com/o/dameluz.html?alt=media&token=9edcecba-c663-4b3b-b430-bff661e...
Submission: On April 20 via manual from MX
Summary
TLS certificate: Issued by GTS CA 1O1 on April 1st 2020. Valid for: 3 months.
This is the only time firebasestorage.googleapis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:1450:400... 2a00:1450:4001:81e::200a | 15169 (GOOGLE) (GOOGLE) | |
1 3 | 2606:4700:303... 2606:4700:3034::6818:7214 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2620:0:862:ed... 2620:0:862:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
1 | 67.202.94.94 67.202.94.94 | 32748 (STEADFAST) (STEADFAST) | |
5 | 5 |
ASN15169 (GOOGLE, US)
firebasestorage.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
elgatovolador.xyz
1 redirects
elgatovolador.xyz |
5 KB |
1 |
amung.us
whos.amung.us |
27 B |
1 |
wikimedia.org
upload.wikimedia.org |
898 B |
1 |
googleapis.com
firebasestorage.googleapis.com |
818 B |
5 | 4 |
Domain | Requested by | |
---|---|---|
3 | elgatovolador.xyz |
1 redirects
firebasestorage.googleapis.com
|
1 | whos.amung.us | |
1 | upload.wikimedia.org | |
1 | firebasestorage.googleapis.com | |
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1O1 |
2020-04-01 - 2020-06-24 |
3 months | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-04-01 - 2020-10-09 |
6 months | crt.sh |
*.wikipedia.org DigiCert SHA2 High Assurance Server CA |
2019-11-12 - 2020-10-06 |
a year | crt.sh |
whos.amung.us GeoTrust EV RSA CA 2018 |
2018-03-09 - 2020-05-25 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://firebasestorage.googleapis.com/v0/b/teamdinero-a1587.appspot.com/o/dameluz.html?alt=media&token=9edcecba-c663-4b3b-b430-bff661ebe91a
Frame ID: AB00F9FF951AC03FFA7FA9F402C17552
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://elgatovolador.xyz/gato/test2/location HTTP 301
- https://elgatovolador.xyz/gato/test2/location/
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
dameluz.html
firebasestorage.googleapis.com/v0/b/teamdinero-a1587.appspot.com/o/ |
125 B 818 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
elgatovolador.xyz/gato/test2/ |
13 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
elgatovolador.xyz/gato/test2/location/ Redirect Chain
|
1 KB 611 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Facebook_Messenger_logo.svg
upload.wikimedia.org/wikipedia/commons/3/3b/ |
696 B 898 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
954 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
27 B 27 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt object| to_object string| a function| __updateOrientation function| checking function| creatingInput function| searchingForms0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
elgatovolador.xyz
firebasestorage.googleapis.com
upload.wikimedia.org
whos.amung.us
2606:4700:3034::6818:7214
2620:0:862:ed1a::2:b
2a00:1450:4001:81e::200a
67.202.94.94
0cae74ee5bad20861dee4906df15d793b948297238f4da81c1b0d7adf3d25f38
3cfb8ca0aa08ce0d8844d9944ff5ffc8d4932ab78f8cf9d411d9bf78de86e383
85f45f9f43fae997b8e22b3aed794d3aa4219cb89d41698e364467ae4ae9c664
93e4c97f0dce9fc2ca3daab9433b40c7c656eb3c42dd1b683e135f243b8ebfb6
d0e9f8a83e23d149cffafe3891d1a500259ecf75f119c2da076cbc9e278def2d
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855