fbooklatco-login-com.filesusr.com
Open in
urlscan Pro
34.102.176.152
Malicious Activity!
Public Scan
Submission: On May 10 via automatic, source openphish
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 9th 2020. Valid for: 6 months.
This is the only time fbooklatco-login-com.filesusr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 34.102.176.152 34.102.176.152 | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a03:2880:f01... 2a03:2880:f01c:8012:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 144.217.92.58 144.217.92.58 | 16276 (OVH) (OVH) | |
1 | 2a03:2880:f11... 2a03:2880:f11c:8183:face:b00c:0:25de | 32934 (FACEBOOK) (FACEBOOK) | |
10 | 5 |
ASN15169 (GOOGLE, US)
PTR: 152.176.102.34.bc.googleusercontent.com
fbooklatco-login-com.filesusr.com |
ASN16276 (OVH, FR)
PTR: 58.ip-144-217-92.net
comohackearfacebook.com.mx |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
fbcdn.net
static.xx.fbcdn.net |
28 KB |
1 |
facebook.com
facebook.com |
222 B |
1 |
comohackearfacebook.com.mx
comohackearfacebook.com.mx |
2 KB |
1 |
filesusr.com
fbooklatco-login-com.filesusr.com |
178 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
2 | static.xx.fbcdn.net |
fbooklatco-login-com.filesusr.com
|
1 | facebook.com |
fbooklatco-login-com.filesusr.com
|
1 | comohackearfacebook.com.mx |
fbooklatco-login-com.filesusr.com
|
1 | fbooklatco-login-com.filesusr.com | |
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.filesusr.com Sectigo RSA Domain Validation Secure Server CA |
2020-02-09 - 2020-08-07 |
6 months | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2020-04-15 - 2020-07-14 |
3 months | crt.sh |
www.comohackearfacebook.com.mx Let's Encrypt Authority X3 |
2020-05-09 - 2020-08-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://fbooklatco-login-com.filesusr.com/html/62865b_2706eaf162b6cd063d01084cf47b5089.html?MTE4OTMzfacebook/d=sn&*ZGFuaW9sYXlhMDUwOUBnbWFpbC5jb20=*aHR0cHM6Ly9tLmZhY2Vib29rLmNvbS9waG90by5waHA/ZmJpZD0zMDI0NzY4NjA3MzY4NDkmaWQ9MTAwMDI5MjM2MTI2OTc0JnNldD1hLjE1MzUzNzI1NTYzMDgxMSZzb3VyY2U9NDg=**TWVsb2NhcmFtZWxvMQ==*RmFjZWJvb2sgRXNwYcOxb2w=
Frame ID: 28BAFA3126643E877E80A9C09B01911B
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
62865b_2706eaf162b6cd063d01084cf47b5089.html
fbooklatco-login-com.filesusr.com/html/ |
178 KB 178 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8MJQYW2UQPc.css
static.xx.fbcdn.net/rsrc.php/v3/yD/l/0,cross/ |
112 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2T_OAQeGk3Y.css
static.xx.fbcdn.net/rsrc.php/v3/yS/l/0,cross/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sAcaU2FJdDD.js
static.xx.fbcdn.net/rsrc.php/v3/yF/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook.png
comohackearfacebook.com.mx/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hsts-pixel.gif
facebook.com/security/ |
43 B 222 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
0TAztId_a4S.js
static.xx.fbcdn.net/rsrc.php/v3/yY/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
XxgXzY84ie6.js
static.xx.fbcdn.net/rsrc.php/v3iDZk4/yn/l/es_LA/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
DNZawPpXNpn.js
static.xx.fbcdn.net/rsrc.php/v3irpj4/yE/l/es_LA/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
056eahAqxba.js
static.xx.fbcdn.net/rsrc.php/v3/yB/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yF/r/sAcaU2FJdDD.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yY/r/0TAztId_a4S.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3iDZk4/yn/l/es_LA/XxgXzY84ie6.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3irpj4/yE/l/es_LA/DNZawPpXNpn.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yB/r/056eahAqxba.js?_nc_x=Ij3Wp8lg5Kz
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| tmpURL object| llegaron object| uno object| dos string| tres object| cuatro object| cinco string| regreso string| urlfin string| idfb string| detector object| lang string| enblanco object| myString object| myArray string| email string| ip function| envFlush object| Env number| _DEV function| CavalryLogger function| updateOrientation undefined| bigPipe0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
comohackearfacebook.com.mx
facebook.com
fbooklatco-login-com.filesusr.com
static.xx.fbcdn.net
static.xx.fbcdn.net
144.217.92.58
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
34.102.176.152
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
55b85359d789590cd9ee87f5da0d41dc7922549541d1c0e34bd3ad870a84099e
569d9611c2270f4466592c35d24615e4326c9e7a050e93aa293c21d7cf775b36
5f0887e548afc10f424c00a47a5626c8d3ab0c26a61a184a7c5a19da916af11f
63932770195c69247041b954eb4d890a6930e0d84d83787257d13f51c8f421a3