agcapital.at.vdradz10gc.live
Open in
urlscan Pro
165.232.73.8
Malicious Activity!
Public Scan
Effective URL: http://agcapital.at.vdradz10gc.live/dc/index.php?246CAC1DA71708219913037=GIMCxiFaVWE&bin=
Submission: On February 20 via manual from GB — Scanned from GB
Summary
This is the only time agcapital.at.vdradz10gc.live was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 7 | 165.232.73.8 165.232.73.8 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 13.225.78.61 13.225.78.61 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 18.210.159.190 18.210.159.190 | 14618 (AMAZON-AES) (AMAZON-AES) | |
8 | 4 |
ASN14061 (DIGITALOCEAN-ASN, US)
agcapital.at.vdradz10gc.live |
ASN16509 (AMAZON-02, US)
PTR: server-13-225-78-61.fra2.r.cloudfront.net
openfpcdn.io |
ASN14618 (AMAZON-AES, US)
PTR: ec2-18-210-159-190.compute-1.amazonaws.com
botd.fpapi.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
vdradz10gc.live
2 redirects
agcapital.at.vdradz10gc.live |
3 MB |
2 |
fpapi.io
botd.fpapi.io — Cisco Umbrella Rank: 586840 |
1 KB |
1 |
openfpcdn.io
openfpcdn.io — Cisco Umbrella Rank: 22432 |
7 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
7 | agcapital.at.vdradz10gc.live |
2 redirects
agcapital.at.vdradz10gc.live
|
2 | botd.fpapi.io |
openfpcdn.io
agcapital.at.vdradz10gc.live |
1 | openfpcdn.io |
agcapital.at.vdradz10gc.live
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
openfpcdn.io Amazon RSA 2048 M01 |
2023-01-25 - 2024-02-24 |
a year | crt.sh |
botd.fpapi.io Amazon RSA 2048 M02 |
2023-02-14 - 2024-03-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://agcapital.at.vdradz10gc.live/dc/index.php?246CAC1DA71708219913037=GIMCxiFaVWE&bin=
Frame ID: 5B39356834C04C968B04344BF06C1AB7
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Shαred Docυment CloυdPage URL History Show full URLs
-
http://agcapital.at.vdradz10gc.live/
HTTP 302
http://agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/?bin= Page URL
-
http://agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/C1C226A38605C8E/R4bb68c8e60a68447ee3d578a44BB68C8E60...
HTTP 302
http://agcapital.at.vdradz10gc.live/dc/index.php?246CAC1DA71708219913037=GIMCxiFaVWE&bin= Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://agcapital.at.vdradz10gc.live/
HTTP 302
http://agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/?bin= Page URL
-
http://agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/C1C226A38605C8E/R4bb68c8e60a68447ee3d578a44BB68C8E60A68447EE3D578A4?FCF7C05BE38219913037=FCF7C05BE38219913037-b35d97effef076354a6df9d055d590a55fc40105&bin=
HTTP 302
http://agcapital.at.vdradz10gc.live/dc/index.php?246CAC1DA71708219913037=GIMCxiFaVWE&bin= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://agcapital.at.vdradz10gc.live/ HTTP 302
- http://agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/?bin=
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
agcapital.at.vdradz10gc.live/MSZKOKQF/REKGYXQSLWFGBH/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v0.1
openfpcdn.io/botd/ |
17 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
detect
botd.fpapi.io/api/v1/ |
44 B 392 B |
Fetch
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
verify
botd.fpapi.io/api/v1/ |
327 B 681 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.php
agcapital.at.vdradz10gc.live/dc/ Redirect Chain
|
456 KB 457 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sto.css
agcapital.at.vdradz10gc.live/dc/core/ |
115 KB 115 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
upos.png
agcapital.at.vdradz10gc.live/dc/assets/img/ |
371 KB 371 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
otto.mp4
agcapital.at.vdradz10gc.live/dc/assets/img/ |
2 MB 2 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
97 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
186 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
20 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
44 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange function| lazyLoad function| delete_cookie function| startTimer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
agcapital.at.vdradz10gc.live/ | Name: PHPSESSID Value: 3ca9885480b5280d6a83b94774d59d2c |
|
agcapital.at.vdradz10gc.live/ | Name: session_token Value: tok |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
agcapital.at.vdradz10gc.live
botd.fpapi.io
openfpcdn.io
13.225.78.61
165.232.73.8
18.210.159.190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