ntegr.usa.cc
Open in
urlscan Pro
149.28.154.100
Malicious Activity!
Public Scan
Submission: On October 03 via api from CA
Summary
This is the only time ntegr.usa.cc was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 149.28.154.100 149.28.154.100 | 20473 (AS-CHOOPA) (AS-CHOOPA - Choopa) | |
10 | 1 |
ASN20473 (AS-CHOOPA - Choopa, LLC, US)
PTR: 149.28.154.100.vultr.com
ntegr.usa.cc |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
usa.cc
ntegr.usa.cc |
66 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | ntegr.usa.cc |
ntegr.usa.cc
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ntegr.usa.cc/MASK/dropbox.com/file/
Frame ID: CA7DC927D7C296F7C2775F92281FC676
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ntegr.usa.cc/MASK/dropbox.com/file/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
googledrive.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
3 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tablet-phone-lap%20-%20Copy.png
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gmail.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hotmail.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yahoo.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
other.jpg
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gen_validatorv4.js
ntegr.usa.cc/MASK/dropbox.com/file/ |
31 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
singin.png
ntegr.usa.cc/MASK/dropbox.com/file/ssl/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Dropbox (Consumer)64 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Validator function| sfm_validator_enable_focus function| add_addnl_vfunction function| set_addnl_vfunction function| run_addnl_validations function| sfm_set_focus function| sfm_disable_validations function| sfm_enable_show_msgs_together function| sfm_validator_message_disp_pos function| clear_all_validations function| form_submit_handler function| add_validation function| handle_item_on_killfocus function| validator_enable_OPED function| validator_enable_OPED_SB function| sfm_ErrorDisplayHandler function| edh_clear_msgs function| edh_FinalShowMsg function| edh_EnableOnPageDisplay function| edh_ShowMsg function| AlertMsgDisplayer function| alert_clearmsg function| alert_showmsg function| sfm_show_error_msg function| SingleBoxErrorDisplay function| sb_div_clearmsg function| sb_div_showmsg function| form_error_div_name function| sfm_show_div_msg function| DivMsgDisplayer function| div_clearmsg function| element_div_name function| div_showmsg function| show_div_msg function| ValidationDesc function| vdesc_validate function| ValidationSet function| add_validationdesc function| vset_validate function| validateEmail function| TestComparison function| TestSelMin function| TestSelMax function| IsCheckSelected function| TestDontSelectChk function| TestShouldSelectChk function| TestRequiredInput function| TestFileExtension function| TestMaxLen function| TestMinLen function| TestInputType function| TestEmail function| TestLessThan function| TestGreaterThan function| TestRegExp function| TestDontSelect function| TestSelectOneRadio function| TestSelectRadio function| validateInput function| VWZ_IsListItemSelected function| VWZ_IsChecked function| sfm_str_trim function| VWZ_IsEmpty object| frmvalidator0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ntegr.usa.cc
149.28.154.100
1b8927c63feb8c0735fcaa249daa141369af6ca8a3ca2f9ddae7aeed7ffd7b29
20e315a5caf1553cd05a8f0a02c290c97d2b3d3ea2e485411456529a26043dd7
22fbe5460eb450fca47e102eb9e8d44c7952d8cbc1392557bcc58db418c5b9ac
3e543cce18b7844ac9dedf6e30d988dca45b543208a870f775c7fe16fd796a9b
42337b1fc437e78b20ee4640d4ade884e6da7495a2a09cb10e4786a6d4014e70
47cf29d05e9b146e3794ad926ce64f4f642d4967e0053f53157808b3f159e841
6e3950ebc494ad4805783f5400f9834b1bc229f585ae309122b0a4f9d64739b7
9f7b2589dd8e4347737d98fd7ffd3ed020873c60b11890009e9d205a7d4539e9
ba301c5ae0d795e133519ac0d2891d8f9cf3820c487e029dbfef86cf61a0c5d2
cd6dcc20c7fc1645a20cb212ba8b84d16212bf0bbfb3b0c987e1724479d54a9b