shanghaiexpogym.gb.net
Open in
urlscan Pro
2606:4700:30::6818:6750
Malicious Activity!
Public Scan
Submission: On June 11 via automatic, source openphish
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on June 7th 2019. Valid for: a year.
This is the only time shanghaiexpogym.gb.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:30:... 2606:4700:30::6818:6750 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2620:11a:e002... 2620:11a:e002:fa00::204 | 22300 (WIKIA) (WIKIA - Wikia) | |
1 2 | 52.18.197.232 52.18.197.232 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
7 | 4 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
shanghaiexpogym.gb.net |
ASN22300 (WIKIA - Wikia, Inc., US)
img4.wikia.nocookie.net |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-18-197-232.eu-west-1.compute.amazonaws.com
sstats.adobe.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
gb.net
shanghaiexpogym.gb.net |
96 KB |
2 |
adobe.com
1 redirects
sstats.adobe.com |
2 KB |
1 |
nocookie.net
img4.wikia.nocookie.net |
8 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
5 | shanghaiexpogym.gb.net |
shanghaiexpogym.gb.net
|
2 | sstats.adobe.com |
1 redirects
shanghaiexpogym.gb.net
|
1 | img4.wikia.nocookie.net |
shanghaiexpogym.gb.net
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-06-07 - 2020-06-06 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh | |
sstats.adobe.com DigiCert SHA2 High Assurance Server CA |
2019-04-14 - 2020-07-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://shanghaiexpogym.gb.net/mail/Adobe.pdf/adobe.php
Frame ID: 805F78D0A2D7C40EA3FB2759D560E65A
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
SiteCatalyst (Analytics) Expand
Detected patterns
- env /^s_(?:account|objectID|code|INST)$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://sstats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/s87219400191873?AQB=1&ndh=1&t=11%2F5%2F2019%2013%3A3%3A27%202%200&ce=UTF-8&ns=adobecorp&pageName=Account%3AOnLoad_ims_SignInForm&g=https%3A%2F%2Fshanghaiexpogym.gb.net%2Fmail%2FAdobe.pdf%2Fadobe.php&ch=IMS&c3=services.adobe.com&c4=en_US&c5=en_US%3AAccount%3AOnLoad_ims_SignInForm&v13=SignInForm&v30=adobedotcom_TOU_client2&s=1600x1200&c=24&j=1.6&v=N&k=N&bw=1600&bh=1200&AQE=1 HTTP 302
- https://sstats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/s87219400191873?AQB=1&pccr=true&vidn=2E7FD34F852E37FA-60002D57203EAE46&&ndh=1&t=11%2F5%2F2019%2013%3A3%3A27%202%200&ce=UTF-8&ns=adobecorp&pageName=Account%3AOnLoad_ims_SignInForm&g=https%3A%2F%2Fshanghaiexpogym.gb.net%2Fmail%2FAdobe.pdf%2Fadobe.php&ch=IMS&c3=services.adobe.com&c4=en_US&c5=en_US%3AAccount%3AOnLoad_ims_SignInForm&v13=SignInForm&v30=adobedotcom_TOU_client2&s=1600x1200&c=24&j=1.6&v=N&k=N&bw=1600&bh=1200&AQE=1
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
adobe.php
shanghaiexpogym.gb.net/mail/Adobe.pdf/ |
255 KB 96 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ath5djs.htm
shanghaiexpogym.gb.net/mail/Adobe.pdf/Sign%20in%20-%20Adobe%20Files_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d_002.htm
shanghaiexpogym.gb.net/mail/Adobe.pdf/Sign%20in%20-%20Adobe%20Files_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d.htm
shanghaiexpogym.gb.net/mail/Adobe.pdf/Sign%20in%20-%20Adobe%20Files_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Adobe_Reader_XI_icon.png
img4.wikia.nocookie.net/__cb20131110012508/logopedia/images/1/1a/ |
8 KB 8 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s87219400191873
sstats.adobe.com/b/ss/adbimsqa,adbadobenonacdcqa/1/JS-1.2.3/ Redirect Chain
|
43 B 648 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
squarespinner_2x.gif
shanghaiexpogym.gb.net/renga-idprovider/resources/web_v2/img/ |
375 B 375 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer)36 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask string| special_day_char function| css_browser_selector function| Visitor function| AppMeasurement function| s_gi function| s_pgicq number| CSSBS number| CSSBS_webkit number| CSSBS_chrome number| CSSBS_mac number| CSSBS_js number| CSSBS_portrait number| s_objectID number| s_giq undefined| s_code string| s_account string| scJsHost function| scReport object| s_c_il number| s_c_in object| s object| s_i_adbimsqa_adbadobenonacdcqa number| ob function| FastClick function| getValidatorGroups function| getEnhancedDropdownParent object| components function| _now function| debounce function| $ function| jQuery object| jQuery19109585419382881308 object| IMS1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.shanghaiexpogym.gb.net/ | Name: __cfduid Value: dd88145f79ad5d3fd82e03476ab28e8c11560258206 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
img4.wikia.nocookie.net
shanghaiexpogym.gb.net
sstats.adobe.com
2606:4700:30::6818:6750
2620:11a:e002:fa00::204
52.18.197.232
0f7ca77a8ac88efd0254763ffd1e11bb301f729c71988b7abb7f2e32d58126dc
33ff424618c807e47824ec0da4665b263056b447adc675366d0d16f76068e078
4403546cef517cb464c7cfa43e4c6170e0e16e35a5879e3aff4bd1b3bd41a6ea
862bb998ffb923b5f17eae41cc404f239ff4b707ed193a6a567a5aefebadc43d
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506