mobilefaceebook.click
Open in
urlscan Pro
172.67.130.134
Malicious Activity!
Public Scan
Effective URL: https://mobilefaceebook.click/7e5B4Hs8PUiJ40FQ3gV5IJglUe4G0Q2IazPA94dk2VITEZotExJmgdj6SwY0l5HRSVK7GjZsnl.html
Submission Tags: @ecarlesi threat phishing Search All
Submission: On October 05 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by WE1 on October 4th 2024. Valid for: 3 months.
This is the only time mobilefaceebook.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 172.67.130.134 172.67.130.134 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 216.58.206.42 216.58.206.42 | 15169 (GOOGLE) (GOOGLE) | |
1 | 216.58.212.170 216.58.212.170 | 15169 (GOOGLE) (GOOGLE) | |
1 | 157.240.252.40 157.240.252.40 | 32934 (FACEBOOK) (FACEBOOK) | |
9 | 4 |
ASN15169 (GOOGLE, US)
PTR: lcfraa-aa-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra24s01-in-f10.1e100.net
ajax.googleapis.com |
ASN32934 (FACEBOOK, US)
PTR: edge-z-m-mini-shv-01-fra3.facebook.com
z-m-static.xx.fbcdn.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mobilefaceebook.click
1 redirects
mobilefaceebook.click |
11 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 ajax.googleapis.com — Cisco Umbrella Rank: 412 |
33 KB |
1 |
fbcdn.net
z-m-static.xx.fbcdn.net — Cisco Umbrella Rank: 10254 |
4 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | mobilefaceebook.click |
1 redirects
mobilefaceebook.click
|
1 | z-m-static.xx.fbcdn.net |
mobilefaceebook.click
|
1 | ajax.googleapis.com |
mobilefaceebook.click
|
1 | fonts.googleapis.com |
mobilefaceebook.click
|
9 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mobilefaceebook.click WE1 |
2024-10-04 - 2025-01-02 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-09-16 - 2024-12-09 |
3 months | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2024-07-14 - 2024-10-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mobilefaceebook.click/7e5B4Hs8PUiJ40FQ3gV5IJglUe4G0Q2IazPA94dk2VITEZotExJmgdj6SwY0l5HRSVK7GjZsnl.html
Frame ID: 943880F0F526E8ECC04F1C53AB0DCC8F
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Facebook - Đăng nhập hoặc đăng kýPage URL History Show full URLs
-
https://mobilefaceebook.click/
HTTP 302
https://mobilefaceebook.click/7e5B4Hs8PUiJ40FQ3gV5IJglUe4G0Q2IazPA94dk2VITEZotExJmgdj6SwY0l5HRSVK7GjZsnl.html Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://mobilefaceebook.click/
HTTP 302
https://mobilefaceebook.click/7e5B4Hs8PUiJ40FQ3gV5IJglUe4G0Q2IazPA94dk2VITEZotExJmgdj6SwY0l5HRSVK7GjZsnl.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
7e5B4Hs8PUiJ40FQ3gV5IJglUe4G0Q2IazPA94dk2VITEZotExJmgdj6SwY0l5HRSVK7GjZsnl.html
mobilefaceebook.click/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
speculation
mobilefaceebook.click/cdn-cgi/ |
128 B 467 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
28 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
mobilefaceebook.click/login/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb-logo.png
mobilefaceebook.click/login/assets/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
meta.png
mobilefaceebook.click/login/assets/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DDgwTv3JehF.png
z-m-static.xx.fbcdn.net/rsrc.php/v3/yM/r/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
mobilefaceebook.click/login/assets/ |
1 KB 897 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mobilefaceebook.click/ | Name: PHPSESSID Value: bn08pmh3ttoq3ccio9g3fc0ffb |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fonts.googleapis.com
mobilefaceebook.click
z-m-static.xx.fbcdn.net
157.240.252.40
172.67.130.134
216.58.206.42
216.58.212.170
11a2142988720cd49ff000e5d488493947b3d34821301c5a706b3495b8381f7d
69ec5dc575cd505e1fdbfdff284e2b734f40921d235bd45916a5de384e65a9fd
69f666b353aab3610c00a1cbb25196847b840de2ba6b0e5a404715312b5435e8
afdd76f6919dc340e54a1045e6f4a8fc840a922c8efd1d07cc5bcdf448373a66
bf494430a8902c58fe646054d534fadc33664ed3f6bae152d5cd7affdce680c1
dd0613a78ab7385702593f21a4c19174ed8e9897e37849b16fc7b97700ffaba8
e6d1d77403cd9f14fd2377d07e84350cfe768e3353e402bf42ebdc8593a58c9a
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d