04q2q.csb.app
Open in
urlscan Pro
2606:4700::6812:1a72
Malicious Activity!
Public Scan
Submission: On November 19 via api from BE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 14th 2020. Valid for: a year.
This is the only time 04q2q.csb.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6812:1a72 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6812:16cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42:1b:... 2a04:4e42:1b::444 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700:303... 2606:4700:3035::6812:34ea | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
codesandbox.io
codesandbox.io |
8 KB |
1 |
pngio.com
img.pngio.com |
31 KB |
1 |
cbsistatic.com
zdnet2.cbsistatic.com |
19 KB |
1 |
csb.app
04q2q.csb.app |
5 KB |
5 | 4 |
Domain | Requested by | |
---|---|---|
2 | codesandbox.io |
04q2q.csb.app
|
1 | img.pngio.com |
04q2q.csb.app
|
1 | zdnet2.cbsistatic.com |
04q2q.csb.app
|
1 | 04q2q.csb.app | |
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-06-14 - 2021-06-14 |
a year | crt.sh |
codesandbox.io Cloudflare Inc ECC CA-3 |
2020-06-19 - 2021-06-19 |
a year | crt.sh |
*.cbsistatic.com DigiCert SHA2 High Assurance Server CA |
2019-02-22 - 2021-02-26 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://04q2q.csb.app/
Frame ID: BA0BE27059D9376628BE78149680A247
Requests: 5 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
04q2q.csb.app/ |
11 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.js
codesandbox.io/public/sse-hooks/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsofts-logo-gets-a-makeover.jpg
zdnet2.cbsistatic.com/hub/i/r/2014/08/27/0d77a99a-2da9-11e4-9e6a-00505685119a/resize/1200x900/02acdb68a1edf918b42c3fabf4843745/ |
25 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
confirm-button-png-2-png-image-confirm-png-968_251.png
img.pngio.com/ |
30 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
watermark-button.ccc763f75.js
codesandbox.io/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.csb.app/ | Name: __cfduid Value: d128e1081ef6013c173aef95f86c7b8d01605813559 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
04q2q.csb.app
codesandbox.io
img.pngio.com
zdnet2.cbsistatic.com
2606:4700:3035::6812:34ea
2606:4700::6812:16cf
2606:4700::6812:1a72
2a04:4e42:1b::444
0bf6786cdbf622dd779c4b04a03f86ffaab9bba1d895e025d4ea5cb09066caf8
4a66ae4c1a3eb9aababe856275c62180b6ee02d6e6ee450515d06efd89124031
5c73ff2eb14e2ff375c3f01f89b398443e303bce67862b9ee9c38eaeeadf2bc1
8cb2990f5245dae9e885a30beeb973a579c2bebd1ad141838b2bcdea85a9cd1f
bcf34c350cca7190789d2646ed8e0fef5fa8e3489fefa25690081de58a259519