teleggram.pro
Open in
urlscan Pro
2606:4700:3032::ac43:ccfe
Malicious Activity!
Public Scan
Submission: On September 04 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on September 2nd 2023. Valid for: 3 months.
This is the only time teleggram.pro was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 2606:4700:303... 2606:4700:3032::ac43:ccfe | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 93.186.227.152 93.186.227.152 | 47541 (VKONTAKTE...) (VKONTAKTE-SPB-AS vk.com) | |
4 | 2 |
ASN47541 (VKONTAKTE-SPB-AS vk.com, RU)
PTR: srv152-227.vkontakte.ru
sun9-57.userapi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
teleggram.pro
teleggram.pro |
80 KB |
1 |
userapi.com
sun9-57.userapi.com — Cisco Umbrella Rank: 64288 |
175 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | teleggram.pro |
teleggram.pro
|
1 | sun9-57.userapi.com |
teleggram.pro
|
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
teleggram.pro GTS CA 1P5 |
2023-09-02 - 2023-12-01 |
3 months | crt.sh |
*.userapi.com GlobalSign Organization Validation CA - SHA256 - G2 |
2023-03-17 - 2024-02-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://teleggram.pro/a0cf310c0d67045495286f53a0282d5c
Frame ID: 54C07AB0D4831AA33D6802F0F810CEB0
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
a0cf310c0d67045495286f53a0282d5c
teleggram.pro/ |
22 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
QC0nN0pk1x4.jpg
sun9-57.userapi.com/impf/c837726/v837726431/39f35/ |
174 KB 175 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c840961d9ed64faa904abe800c24a94d.min.js
teleggram.pro/smeans/files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pattern.svg
teleggram.pro/smeans/files/ |
226 KB 69 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| _0x39ed function| _0x2e96 object| TWallpaper function| _0x28efda function| _0x327b object| tme_bg function| _0x485e function| toggleTheme object| darkMedia1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
teleggram.pro/ | Name: PHPSESSID Value: v8s7t6rfj8b692p0vo1iugcuts |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sun9-57.userapi.com
teleggram.pro
2606:4700:3032::ac43:ccfe
93.186.227.152
08d5fc1fac475dca14ceb729373bf4a8c661a4d8bfbcb431402dcba6290aa946
118add53487c02aaf5b5ab9f69380fa06717deb10492e14aaa487e3c62806ad4
62911cb0321231a781c42aebe5b6e94848d9eb9bfc03411dc2b5ad3645f2440a
94796893ab48d97d3a9d5a64282908deb66e4658dbd65a6b37890d39947ae31a