dsw.accunity.com
Open in
urlscan Pro
144.202.77.172
Malicious Activity!
Public Scan
Effective URL: https://dsw.accunity.com/wp-content/uploads/file/2h5fnlpuqjwgfzd1wix7svba.php?email=lena.holm.saxtoft@skuld.com&75FLG6158...
Submission: On April 24 via manual from NO
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 19th 2020. Valid for: 3 months.
This is the only time dsw.accunity.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.115.54 167.89.115.54 | 11377 (SENDGRID) (SENDGRID) | |
2 4 | 144.202.77.172 144.202.77.172 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
2 | 2 |
ASN11377 (SENDGRID, US)
PTR: o16789115x54.outbound-mail.sendgrid.net
u15906947.ct.sendgrid.net |
ASN20473 (AS-CHOOPA, US)
PTR: 144.202.77.172.vultr.com
dsw.accunity.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
accunity.com
2 redirects
dsw.accunity.com |
397 KB |
1 |
sendgrid.net
1 redirects
u15906947.ct.sendgrid.net |
286 B |
2 | 2 |
Domain | Requested by | |
---|---|---|
4 | dsw.accunity.com |
2 redirects
dsw.accunity.com
|
1 | u15906947.ct.sendgrid.net | 1 redirects |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dsw.accunity.com cPanel, Inc. Certification Authority |
2020-02-19 - 2020-05-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dsw.accunity.com/wp-content/uploads/file/2h5fnlpuqjwgfzd1wix7svba.php?email=lena.holm.saxtoft@skuld.com&75FLG6158773231517f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c&AP___=&error=
Frame ID: 4B7BFE5FEC3CA13B8FFB9BAE9C175766
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u15906947.ct.sendgrid.net/ls/click?upn=Qzj3M-2B3aCnRpHysEQ8deXoJJ4Es0rGbPz4k8CtVfm8IaklyoetSjgOYA2GnJ-...
HTTP 302
https://dsw.accunity.com/wp-content/uploads/file?email=lena.holm.saxtoft@skuld.com HTTP 301
https://dsw.accunity.com/wp-content/uploads/file/?email=lena.holm.saxtoft@skuld.com HTTP 302
https://dsw.accunity.com/wp-content/uploads/file/2h5fnlpuqjwgfzd1wix7svba.php?email=lena.holm.saxtoft... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u15906947.ct.sendgrid.net/ls/click?upn=Qzj3M-2B3aCnRpHysEQ8deXoJJ4Es0rGbPz4k8CtVfm8IaklyoetSjgOYA2GnJ-2ByvizSH8YJYovrMfJaYW0Zcsu4CIYuf4OzY6JvnqdZ1WmX0ITjDKuO6ksm-2FOqq1RULvjeGxS_poQSp7tv-2BCKjEsLA8ZsZVwHPTKZpvcm8cBCjltaskYlrBz1RJDWIFO5vD1jp76pVHDoRyJcrx4-2Bv1mdBuzbwzjzpvfKeLQdvciF1GLZThp-2F0XpKYvqCJhpqjS3Hj06t-2FrRGHwvXkDpcik6KnfEzXEM-2BzE3wNN4rGmR4aEXYSVGjaGlKwH0RH3wBNO-2B3wZLUJmB8TFhnDlJ1zOspPmkCOnJbDtK8751fx8hq4N0d7cJ0-3D
HTTP 302
https://dsw.accunity.com/wp-content/uploads/file?email=lena.holm.saxtoft@skuld.com HTTP 301
https://dsw.accunity.com/wp-content/uploads/file/?email=lena.holm.saxtoft@skuld.com HTTP 302
https://dsw.accunity.com/wp-content/uploads/file/2h5fnlpuqjwgfzd1wix7svba.php?email=lena.holm.saxtoft@skuld.com&75FLG6158773231517f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c17f2a78aaa119fb240ae9fd23a29227c&AP___=&error= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
2h5fnlpuqjwgfzd1wix7svba.php
dsw.accunity.com/wp-content/uploads/file/ Redirect Chain
|
478 KB 356 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
273 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Product.ttf
dsw.accunity.com/wp-content/uploads/file/ |
40 KB 40 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dsw.accunity.com
u15906947.ct.sendgrid.net
144.202.77.172
167.89.115.54
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f
ada0f98fb645a5391937ce275b58a0236daedfd6cb7f4c73da588934cb7a941c
b34cbb71d75b84eb4925f51e050249f65fb3e3550133aba0a4c161c6820aec82
e166efe12f0033e2a9e3339cdeaa31beb4edecc489be513fd95877868e65cca4