securedownload.network
Open in
urlscan Pro
52.85.182.53
Malicious Activity!
Public Scan
Submission: On December 24 via manual from US
Summary
This is the only time securedownload.network was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fake Adobe Update Apple Software Update (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.85.182.53 52.85.182.53 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
9 | 2600:9000:200... 2600:9000:200d:6a00:14:b05e:6c0:21 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
10 | 2 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-52-85-182-53.fra50.r.cloudfront.net
securedownload.network |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
d39z3dn4hnpfyz.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
cloudfront.net
d39z3dn4hnpfyz.cloudfront.net |
151 KB |
1 |
securedownload.network
securedownload.network |
7 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
9 | d39z3dn4hnpfyz.cloudfront.net |
securedownload.network
|
1 | securedownload.network | |
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
weiverous-lograttle.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://securedownload.network/flash/01-02-en-AyKGgXZke3gTx9K9MCWGPn2H/install.html?cep=eNIeoYRPM0kUt5CPfvfUOcMV_HtYdLsoKNZmxP8YohoS_InKZQUjGM9HTFEcJU_dO8nFhpcpmvFtQSi9cMc9duk5AM8EFeyg1bezWb3HcfBnqm6f5schab4FjJknJ6DWdbeZvBJ1DVPi2DX2GIpyuv1K0AS5_t3llqIP43l-fz9fuaNtj7muGa01EcijoyaQhvESf6
Frame ID: 848CF3B7EAEFE76D9785841272EE99AE
Requests: 10 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Flash Player UpdateInstall latest version of Adobe Flash Player in order to continue.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
install.html
securedownload.network/flash/01-02-en-AyKGgXZke3gTx9K9MCWGPn2H/ |
42 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flash_circle.png
d39z3dn4hnpfyz.cloudfront.net/lps/flash_worldcup/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
commands_3.png
d39z3dn4hnpfyz.cloudfront.net/lps/flash_mac/images/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_f.png
d39z3dn4hnpfyz.cloudfront.net/lps/fadein_f/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow__blue.png
d39z3dn4hnpfyz.cloudfront.net/lps/flash_mac/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern__safari1.jpg
d39z3dn4hnpfyz.cloudfront.net/lps/flash_mac/images/ |
25 KB 25 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pattern__safari-arrow.png
d39z3dn4hnpfyz.cloudfront.net/lps/flash_mac/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chrome.png
d39z3dn4hnpfyz.cloudfront.net/lps/FlashPlayer2_T/images/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shadow.png
d39z3dn4hnpfyz.cloudfront.net/lps/newLPs/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flash_bwideexit2.png
d39z3dn4hnpfyz.cloudfront.net/lps/flash_mac/images/ |
53 KB 54 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fake Adobe Update Apple Software Update (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask string| nAgt string| browserimg number| verOffset function| dragElement function| hide_download function| showStep function| addEvent0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
d39z3dn4hnpfyz.cloudfront.net
securedownload.network
2600:9000:200d:6a00:14:b05e:6c0:21
52.85.182.53
044ac8b1eda4cd3b9634321cda978d6f63e8d1867bf9c4b837daa1620cbdf7f9
25b13e2e8af4969b966c36d6700b019e506dc5151ea6d63224e8827ac318de91
3e81b841678d4407b3c7f41c00b6c0bec3a21484adef370a6a3deefb0da1c95a
5377ef31bb10d31f7c6d96dd13f32bcdef03e1fb41f81f3eb3a73808d94d9842
5bbee510c3b5965532d53185cadd47753740b6445f2b9bded3849424fcd2661a
74942ecaad9f6671c7243934b3a2027834e777d361a136550aee3195e0606f3c
7b4d70d5fb64a31f115e1e853b7272e1415ffec2234e78e00847350c23d607fe
7b663522d386ed5c44151f83a378004c797f2a98276136c981fbdfc76392659b
7c48ecdfda540af22ecb4d9638c8c0082e401cc4b45aa2df46c976ec80d38c12
f4c14d0156315e5c1655e51cf2478e5e350772b1bf3ec62f17e01fe18ea01cbe