interpretation.flu.cc
Open in
urlscan Pro
5.249.147.153
Malicious Activity!
Public Scan
Submission: On August 06 via manual from US
Summary
This is the only time interpretation.flu.cc was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 5.249.147.153 5.249.147.153 | 31034 (ARUBA-ASN) (ARUBA-ASN) | |
2 | 204.141.99.67 204.141.99.67 | 46582 (SMARTSHEE...) (SMARTSHEETCOREPRODUCT - Smartsheet) | |
2 | 117.121.250.12 117.121.250.12 | 22822 (LLNW) (LLNW - Limelight Networks) | |
7 | 3 |
ASN31034 (ARUBA-ASN, IT)
PTR: host153-147-249-5.serverdedicati.aruba.it
interpretation.flu.cc |
ASN46582 (SMARTSHEETCOREPRODUCT - Smartsheet, US)
app.smartsheet.com |
ASN22822 (LLNW - Limelight Networks, Inc., US)
PTR: https-117-121-250-12.sin.llnw.net
s.smartsheet.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
smartsheet.com
app.smartsheet.com s.smartsheet.com |
88 KB |
3 |
flu.cc
interpretation.flu.cc |
142 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
3 | interpretation.flu.cc |
interpretation.flu.cc
|
2 | s.smartsheet.com |
interpretation.flu.cc
|
2 | app.smartsheet.com |
interpretation.flu.cc
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
s.smartsheet.com DigiCert SHA2 Extended Validation Server CA |
2017-10-12 - 2019-10-17 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://interpretation.flu.cc/odidd/Valid/gm/index.php
Frame ID: 45D264EF43E153FE42C371F5AB9D5FB5
Requests: 6 HTTP requests in this frame
Frame:
https://s.smartsheet.com/b/htmlSandbox/gtm-iframe_v2.html?http%3A%2F%2Finterpretation.flu.cc>M-5GPPFG&eventObject=login%20screen&eventNoun=Form%20-%20Login
Frame ID: E0D151E9C13C2D71D724CA81A036AA51
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
index.php
interpretation.flu.cc/odidd/Valid/gm/ |
7 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.2x_59.2.3.css
interpretation.flu.cc/odidd/Valid/gm/ |
10 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1_59.2.3.js
app.smartsheet.com/b/javascript/ |
235 KB 54 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LG_59.2.3.js
app.smartsheet.com/b/javascript/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img_login_microsoft2.2x.png
s.smartsheet.com/b/images/ |
455 B 665 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.png
interpretation.flu.cc/odidd/Valid/gm/ |
124 KB 124 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gtm-iframe_v2.html
s.smartsheet.com/b/htmlSandbox/ Frame E0D1 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Excel / PDF download (Online)230 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ZQ function| ACL function| EFH object| MI boolean| CTD boolean| DMD boolean| FHB boolean| HBU boolean| YXZ function| ACS number| SND number| ATNS object| BU object| BHNC undefined| ENP undefined| NKX function| NIG function| BQHB function| AWOH function| BKFT function| BCSX function| BPSP function| BKPQ function| BPUV function| BBXQ function| BWAM function| LEB function| BRG function| SRB function| AVGG function| removeNode function| BKPT function| EVS function| toHtml function| BXDG function| ALUK function| NPW function| QGW function| ETM function| HFJ function| FGH function| BDZK function| KML function| BIOM function| EM function| AYX function| QRC function| HNN function| AUJ function| DIA function| HNO function| ACZG function| YQR function| YQP function| YQQ function| ASOU function| ASOS function| ASOT function| DEZ function| JW function| DHZ function| ACZD function| ASS function| AGH function| HBF function| BEQX function| VFT function| ASNZ function| SSR function| YPP function| YPQ function| YPR function| ASPP function| OTO function| AJBB function| AJBD function| AJBC function| IBK function| YPY function| KYB function| EZJ function| AJBH function| BDTD function| ASBL function| AUUM function| EUH function| BHYY function| BHYT function| trim function| IYG function| BXEP function| normalize function| ACDW function| PDG function| AUUS function| YZJ function| GIC function| YKO function| APVK function| XBP function| ANP function| EMX function| ARUA function| BHG function| DYT function| DQE function| TXH function| AXDW function| ETS function| ZCN function| HL function| BCBE function| AVPE function| KYP function| AMAX function| LVE function| AQQE function| BKCP function| AFU function| JIK function| YIM function| AMJE function| AJNQ function| AMBU function| EN function| YYC function| BWQA function| QG function| KUW function| XRH function| AVX function| AHMT function| ACSP function| NLC function| BESR function| BJXW function| BFOZ function| VJT function| ATET function| ACSO function| BKCL function| CFL function| ABM function| ACUJ function| MBK function| EGN function| UMY function| LSN function| AFW function| AQPJ function| GC function| IWQ function| JR function| NSL function| BQMR function| QUR function| YZG function| ALYV function| ARN function| isArray function| ISH function| VKK function| NMC function| BTZ function| BDDS function| GDH function| ARDN function| PMJ function| BGD function| QDR function| BIBR function| ALQG function| BCHT function| isEqual function| BQEW function| ABIP function| BYE function| RCM function| BCDN function| BFQO function| loadScript function| ADBB function| SQX function| ALVC function| VEK function| HVA function| Iterator function| GVK function| GHL function| ZTS function| contains function| IYS object| JI object| VW function| BOS function| GVS function| DKA function| EWW undefined| BK function| BMQD function| AOLS function| BMQF function| BMQE function| AZT function| AXUU function| RSO function| OBK function| EKP function| BWAQ function| ALHE function| BFMS function| BPIB function| WYA object| BFHE function| CEW function| delayedLinkWithFunction function| logExternalGTMEvent object| AZW object| AVC function| addPlaceholderSupport function| addPlaceholderElements function| placeholderKeyupHandler function| $ function| jQuery function| showTooltips function| hideTooltips function| loadLoginBody function| downloadApp function| loggedFailures object| frame1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
interpretation.flu.cc/ | Name: PHPSESSID Value: qqqh7gn8vn90bsfv8s9u8o6ne5 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app.smartsheet.com
interpretation.flu.cc
s.smartsheet.com
117.121.250.12
204.141.99.67
5.249.147.153
55b0b36451145bef2b6057fd6abec53ad2c8836e8535e5d36b72ba45aafd2ff8
81dc7a1aa67f1fcfa4c2a82220cfb1dd17b0b709d1e993f8f30cb1ee667398d0
9864fdf995368063ea9a55fb0f6baa42cfb677c33d704f959459b0848dbda8b3
c19c6bf692e65d94046ad86cf85f227ea8c6d6f54817d1022ee298fb5d7ba2a4
c61971b161f0683fe5c7e594bf532b0893cbfcdee2e6d1f950a640bca4ffdf7d
fbbb7bda18ada7a941d79335b49119595dc41d737fcd06a130c60283d5e16ee2