zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com
Open in
urlscan Pro
52.219.121.9
Malicious Activity!
Public Scan
Effective URL: https://zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com/index.html
Submission Tags: falconsandbox
Submission: On January 13 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon on March 26th 2021. Valid for: a year.
This is the only time zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2a00:1450:400... 2a00:1450:4001:812::200e | 15169 (GOOGLE) (GOOGLE) | |
1 1 | 142.250.186.166 142.250.186.166 | 15169 (GOOGLE) (GOOGLE) | |
4 | 2606:4700::68... 2606:4700::6812:17cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:5f41 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 52.219.121.9 52.219.121.9 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 162.241.115.109 162.241.115.109 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 6 |
ASN15169 (GOOGLE, US)
clickserve.dartsearch.net |
ASN15169 (GOOGLE, US)
PTR: fra24s08-in-f6.1e100.net
ad.doubleclick.net |
ASN13335 (CLOUDFLARENET, US)
yum6t.codesandbox.io | |
codesandbox.io |
ASN16509 (AMAZON-02, US)
PTR: s3-us-west-1-r-w.amazonaws.com
zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: webgator.cloud
pushyflamingo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
codesandbox.io
yum6t.codesandbox.io codesandbox.io — Cisco Umbrella Rank: 113606 |
57 KB |
3 |
pushyflamingo.com
pushyflamingo.com |
8 KB |
2 |
dartsearch.net
2 redirects
clickserve.dartsearch.net — Cisco Umbrella Rank: 3325 |
1 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 202 |
28 KB |
1 |
amazonaws.com
zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com |
597 KB |
1 |
cloudflareinsights.com
static.cloudflareinsights.com — Cisco Umbrella Rank: 1229 |
5 KB |
1 |
doubleclick.net
1 redirects
ad.doubleclick.net — Cisco Umbrella Rank: 187 |
752 B |
11 | 7 |
Domain | Requested by | |
---|---|---|
3 | pushyflamingo.com |
cdnjs.cloudflare.com
|
2 | codesandbox.io |
yum6t.codesandbox.io
codesandbox.io |
2 | yum6t.codesandbox.io |
yum6t.codesandbox.io
|
2 | clickserve.dartsearch.net | 2 redirects |
1 | cdnjs.cloudflare.com |
zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com
|
1 | zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com |
yum6t.codesandbox.io
|
1 | static.cloudflareinsights.com |
yum6t.codesandbox.io
|
1 | ad.doubleclick.net | 1 redirects |
11 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
codesandbox.io Cloudflare Inc ECC CA-3 |
2021-05-19 - 2022-05-18 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-06-11 - 2022-06-10 |
a year | crt.sh |
*.s3-us-west-1.amazonaws.com Amazon |
2021-03-26 - 2022-03-25 |
a year | crt.sh |
mail.pushyflamingo.com R3 |
2021-12-22 - 2022-03-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com/index.html
Frame ID: 5966E98A6E4F2D51BCB865BE869EE98B
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Sign in to OutlookPage URL History Show full URLs
-
http://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&d...
HTTP 301
https://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&d... HTTP 302
https://ad.doubleclick.net/ddm/clk/492846694;299712857;l;u=ds&sv1=0&sv2=3284195140240677&sv3=7314364897... HTTP 302
https://yum6t.codesandbox.io/?af=c2RlcnJpY2tAY2FuY2FwaXRhbC5jb20=&gclid=CJKF6pKqr_UCFRdEHQkdPrADyw Page URL
- https://zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com/index.html Page URL
Detected technologies
Cloudflare Browser Insights (Analytics) ExpandDetected patterns
- static\.cloudflareinsights\.com/beacon(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&ds_a_fiid&ds_a_lid&ds_e_adid=512650395034&ds_e_matchtype&ds_e_device=c&ds_e_network&ds_url_v=2&ds_dest_url=https%3A%2F%2Fyum6t.codesandbox.io%2F%3Faf%3Dc2RlcnJpY2tAY2FuY2FwaXRhbC5jb20%3D
HTTP 301
https://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&ds_a_fiid&ds_a_lid&ds_e_adid=512650395034&ds_e_matchtype&ds_e_device=c&ds_e_network&ds_url_v=2&ds_dest_url=https%3A%2F%2Fyum6t.codesandbox.io%2F%3Faf%3Dc2RlcnJpY2tAY2FuY2FwaXRhbC5jb20%3D HTTP 302
https://ad.doubleclick.net/ddm/clk/492846694;299712857;l;u=ds&sv1=0&sv2=3284195140240677&sv3=7314364897558438411&gclid=CJKF6pKqr_UCFRdEHQkdPrADyw;%3fhttps://yum6t.codesandbox.io/?af=c2RlcnJpY2tAY2FuY2FwaXRhbC5jb20= HTTP 302
https://yum6t.codesandbox.io/?af=c2RlcnJpY2tAY2FuY2FwaXRhbC5jb20=&gclid=CJKF6pKqr_UCFRdEHQkdPrADyw Page URL
- https://zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&ds_a_fiid&ds_a_lid&ds_e_adid=512650395034&ds_e_matchtype&ds_e_device=c&ds_e_network&ds_url_v=2&ds_dest_url=https%3A%2F%2Fyum6t.codesandbox.io%2F%3Faf%3Dc2RlcnJpY2tAY2FuY2FwaXRhbC5jb20%3D HTTP 301
- https://clickserve.dartsearch.net/link/click?ds_a_cid=680760384&ds_a_caid=12694754542&ds_a_agid=123477218634&ds_a_fiid&ds_a_lid&ds_e_adid=512650395034&ds_e_matchtype&ds_e_device=c&ds_e_network&ds_url_v=2&ds_dest_url=https%3A%2F%2Fyum6t.codesandbox.io%2F%3Faf%3Dc2RlcnJpY2tAY2FuY2FwaXRhbC5jb20%3D HTTP 302
- https://ad.doubleclick.net/ddm/clk/492846694;299712857;l;u=ds&sv1=0&sv2=3284195140240677&sv3=7314364897558438411&gclid=CJKF6pKqr_UCFRdEHQkdPrADyw;%3fhttps://yum6t.codesandbox.io/?af=c2RlcnJpY2tAY2FuY2FwaXRhbC5jb20= HTTP 302
- https://yum6t.codesandbox.io/?af=c2RlcnJpY2tAY2FuY2FwaXRhbC5jb20=&gclid=CJKF6pKqr_UCFRdEHQkdPrADyw
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
yum6t.codesandbox.io/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sse-hooks.f648b14c15c640a14a557113a991cb8d.js
codesandbox.io/public/sse-hooks/ |
172 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.be879265d.js
codesandbox.io/static/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
yum6t.codesandbox.io/cdn-cgi/bm/cv/669835187/ |
35 KB 9 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v652eace1692a40cfa3763df669d7439c1639079717194
static.cloudflareinsights.com/beacon.min.js/ |
14 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
phishing
codesandbox.io/api/v1/sandboxes/yum6t/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.html
zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com/ |
597 KB 597 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.6.0/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
756 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
899 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
222 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
915 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
277 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
call.php
pushyflamingo.com/wp-addoncontent/ |
657 B 965 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clearbit.php
pushyflamingo.com/wp-addoncontent/ |
3 KB 4 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clearbit.php
pushyflamingo.com/wp-addoncontent/ |
3 KB 4 KB |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- codesandbox.io
- URL
- https://codesandbox.io/api/v1/sandboxes/yum6t/phishing
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onsecuritypolicyviolation object| onslotchange function| $ function| jQuery number| lc function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.doubleclick.net/ | Name: IDE Value: AHWqTUlWa7oasPjtY4hdywoPJZrUt6dco0k2yYsExXEqhcZbVwSr0HgMHSvzJcMxKkE |
|
.doubleclick.net/ | Name: FLC Value: CKCupAIQ2YL1jgEY5vyA6wEoybSRBTCi14GPBg |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ad.doubleclick.net
cdnjs.cloudflare.com
clickserve.dartsearch.net
codesandbox.io
pushyflamingo.com
static.cloudflareinsights.com
yum6t.codesandbox.io
zsfhruemi9290-amahgdbehwma.s3.us-west-1.amazonaws.com
codesandbox.io
142.250.186.166
162.241.115.109
2606:4700::6810:135e
2606:4700::6810:5f41
2606:4700::6812:17cf
2a00:1450:4001:812::200e
52.219.121.9
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
185f316eb86d0b318b19a5cae0e8fe3cf0c56d327786fbe27b6652769463ea73
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
2b42b5073b16674bb55b34e97d497a2aedf6fa669e02fd61aa2fd14755b107b7
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2
8056c9d7599b2e17b4312bac0298ca766fed6f2eb5b109392a8776de4b0571b0
96af0fefab5eadd92e5310fa1d94a1fdb23ab6fa249a7bad477be8d1e2bfea5c
a925c579b42a4dc3a64905b3b1a8c725f266c86786f3058afbc56a36ef974189
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2
e7f2546571b3ef4f478b21269a547de761d32bb828623bc4174a4e57261fd218
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e