verg.ga
Open in
urlscan Pro
2606:4700:3032::681b:8bf8
Malicious Activity!
Public Scan
Effective URL: https://verg.ga/%25%5e&*(%5e&*()&*(/Login.php?sslchannel=true
Submission: On March 16 via manual from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 12th 2020. Valid for: 7 months.
This is the only time verg.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Box.com (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2600:9000:214... 2600:9000:214f:7600:19:9934:6a80:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 14 | 2606:4700:303... 2606:4700:3032::681b:8bf8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:197::3114 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2606:4700:20:... 2606:4700:20::681a:56c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE) | |
17 | 4 |
ASN20940 (AKAMAI-ASN1, US)
store-images.s-microsoft.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
verg.ga
1 redirects
verg.ga |
186 KB |
2 |
gstatic.com
fonts.gstatic.com |
45 KB |
1 |
pngimg.com
pngimg.com |
33 KB |
1 |
s-microsoft.com
store-images.s-microsoft.com |
5 KB |
1 |
app.link
1 redirects
brem3.app.link |
685 B |
17 | 5 |
Domain | Requested by | |
---|---|---|
14 | verg.ga |
1 redirects
verg.ga
|
2 | fonts.gstatic.com | |
1 | pngimg.com |
verg.ga
|
1 | store-images.s-microsoft.com |
verg.ga
|
1 | brem3.app.link | 1 redirects |
17 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-03-12 - 2020-10-09 |
7 months | crt.sh |
store-images.microsoft.com Microsoft IT TLS CA 4 |
2020-01-03 - 2022-01-03 |
2 years | crt.sh |
*.google.com GTS CA 1O1 |
2020-02-25 - 2020-05-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://verg.ga/%25%5e&*(%5e&*()&*(/Login.php?sslchannel=true
Frame ID: 3A6E2B9F271ABA6947F05A77BB6D4722
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://brem3.app.link/XJm78VW1T4
HTTP 307
https://verg.ga/%25%5E%26*(%5E%26*()%26*(?_branch_match_id=768163636120031215&utm_medium=mar... HTTP 301
https://verg.ga/%25%5e&*(%5e&*()&*(/?_branch_match_id=768163636120031215&utm_medium=marketing Page URL
- https://verg.ga/%25%5e&*(%5e&*()&*(/Login.php?sslchannel=true Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://brem3.app.link/XJm78VW1T4
HTTP 307
https://verg.ga/%25%5E%26*(%5E%26*()%26*(?_branch_match_id=768163636120031215&utm_medium=marketing HTTP 301
https://verg.ga/%25%5e&*(%5e&*()&*(/?_branch_match_id=768163636120031215&utm_medium=marketing Page URL
- https://verg.ga/%25%5e&*(%5e&*()&*(/Login.php?sslchannel=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://brem3.app.link/XJm78VW1T4 HTTP 307
- https://verg.ga/%25%5E%26*(%5E%26*()%26*(?_branch_match_id=768163636120031215&utm_medium=marketing HTTP 301
- https://verg.ga/%25%5e&*(%5e&*()&*(/?_branch_match_id=768163636120031215&utm_medium=marketing
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
verg.ga/%25%5e&*(%5e&*()&*(/ Redirect Chain
|
113 B 284 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
Login.php
verg.ga/%25%5e&*(%5e&*()&*(/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_yXMMnLSSpPunfPzrxqTY5Fxi0thyZrjewLEjqduzimc.css
verg.ga/%25%5e&*(%5e&*()&*(/assets/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_whE_FIKmCdJjmQukMY5DBbmkss9qZjXENYcyIcR-90c.css
verg.ga/%25%5e&*(%5e&*()&*(/assets/css/ |
18 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
verg.ga/%25%5e&*(%5e&*()&*(/assets/css/ |
4 KB 609 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css_7jDhC7Vm4-oxtUbtZMHwD8LA2Gp2KNpvOzvod9283FA.css
verg.ga/%25%5e&*(%5e&*()&*(/assets/css/ |
202 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apps.25144.13510798887489353.ba91417f-f0d9-447e-8437-1c100c23ade6.096b3123-c50e-4942-be9b-cb16e629d4de
store-images.s-microsoft.com/image/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
email_PNG20.png
pngimg.com/uploads/email/ |
32 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AstraZeneca_0.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PG_433x90.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GE.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Nationwide.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Boston.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Pandora.png
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home_masthead_ipadonly.jpg
verg.ga/%25%5e&*(%5e&*()&*(/assets/img/ |
84 KB 84 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v14/ |
23 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v14/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Box.com (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brem3.app.link
fonts.gstatic.com
pngimg.com
store-images.s-microsoft.com
verg.ga
2600:9000:214f:7600:19:9934:6a80:93a1
2606:4700:20::681a:56c
2606:4700:3032::681b:8bf8
2a00:1450:4001:81d::2003
2a02:26f0:6c00:197::3114
1670565574aab8aa0a287a4cd8f49cf0d8b0959ebe344f90ca8af696ede9c23b
2693186aa9644890b9d6858c4b784ccde2de3d26207b7703201efcc714e913f9
3470e4402c0cbe8c6eecae0dbb06a28fab1e4ec7958fb9ed311e230bc1ade564
72bec71587651312300449a7e61220994b46aff8079fc0517ca84e6f5ac55fbe
748195ac015cee91667a22f2e14e6f5b80985245f88c69f870cc757b517cfa21
818ba83870603d9695a9494b7215068689b7fe9153b8d57e9274fc46e72f975a
86a57a85f31ac7ee763d7f61891d5717db271799927d28481ded6a660ca4b4e6
944961358121e68879546ff9defcc0db811870eebbc2e2a3fee5b42628bd80ed
988e7ea05e4b996a604b5055500051b9021d763be5aea15ac1146d83469896d4
a554cb8697bbff79dad0f9a171035d188e0827ce4b28fdd43e4362d3ab7f04f2
a80f6e04a6c9f0bd6349e8ffe05eeacae606ec98ccbecfa70c6312b5fa96f836
ba3ab1671decc2ac4f1c395411961d84f9d9e58d3e513f85c15fd4229d6dd60f
bbb469f93e1508e7599af8be5ee580b36ce5946b701fcb67e7301fd5af9f434f
c2113f1482a609d263990ba4318e4305b9a4b2cf6a6635c435873221c47ef747
c9730c9cb492a4fba77cfcebc6a4d8e45c62d2d87266b8dec0b123a9dbb38a67
ead13ccfbdea5462c3af37aa6ae04e64ed65a31c33f76e46da5e86ec85c52064
ee30e10bb566e3ea31b546ed64c1f00fc2c0d86a7628da6f3b3be877ddbcdc50