uaa.whsasnae.com
Open in
urlscan Pro
2606:4700:3033::6815:4026
Malicious Activity!
Public Scan
Effective URL: https://uaa.whsasnae.com/
Submission: On October 08 via api from HK — Scanned from GB
Summary
TLS certificate: Issued by WE1 on September 27th 2024. Valid for: 3 months.
This is the only time uaa.whsasnae.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WhatsApp (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 2606:4700:303... 2606:4700:3033::6815:4026 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a03:2880:f27... 2a03:2880:f277:1cd:face:b00c:0:167 | 32934 (FACEBOOK) (FACEBOOK) | |
21 | 3 |
ASN32934 (FACEBOOK, US)
static.whatsapp.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
whsasnae.com
uaa.whsasnae.com |
95 KB |
2 |
whatsapp.net
static.whatsapp.net — Cisco Umbrella Rank: 1755 |
19 KB |
21 | 2 |
Domain | Requested by | |
---|---|---|
19 | uaa.whsasnae.com |
uaa.whsasnae.com
|
2 | static.whatsapp.net |
uaa.whsasnae.com
|
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
whsasnae.com WE1 |
2024-09-27 - 2024-12-26 |
3 months | crt.sh |
*.whatsapp.net DigiCert SHA2 High Assurance Server CA |
2024-07-17 - 2024-10-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://uaa.whsasnae.com/
Frame ID: 73590DEAB95E404DF63038C38A8CD143
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
wsPage URL History Show full URLs
-
http://uaa.whsasnae.com/
HTTP 307
https://uaa.whsasnae.com/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://uaa.whsasnae.com/
HTTP 307
https://uaa.whsasnae.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
uaa.whsasnae.com/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
speculation
uaa.whsasnae.com/cdn-cgi/ |
128 B 471 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qcCode.js
uaa.whsasnae.com/ |
19 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
console.ban.min.js
uaa.whsasnae.com/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app~d0ae3f07.01005678.css
uaa.whsasnae.com/css/ |
43 B 353 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app~d0ae3f07.01005678.chunk.js
uaa.whsasnae.com/js/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk.jquery~00cb062a.01005678.chunk.js
uaa.whsasnae.com/js/ |
86 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk.vue-loader~06e90eef.01005678.chunk.js
uaa.whsasnae.com/js/ |
905 B 808 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk.vue-router~b1f96ece.01005678.chunk.js
uaa.whsasnae.com/js/ |
29 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk.vue~d2305125.01005678.chunk.js
uaa.whsasnae.com/js/ |
70 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
runtime.01005678.bundle.js
uaa.whsasnae.com/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-bba68bf6.01005678.css
uaa.whsasnae.com/css/ |
0 2 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-2d0f0271.01005678.chunk.js
uaa.whsasnae.com/js/ |
0 5 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-58244724.01005678.chunk.js
uaa.whsasnae.com/js/ |
0 1 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-bba68bf6.01005678.chunk.js
uaa.whsasnae.com/js/ |
0 401 B |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-58244724.01005678.chunk.js
uaa.whsasnae.com/js/ |
1 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-2d0f0271.01005678.chunk.js
uaa.whsasnae.com/js/ |
10 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-bba68bf6.01005678.css
uaa.whsasnae.com/css/ |
5 KB 0 |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-bba68bf6.01005678.chunk.js
uaa.whsasnae.com/js/ |
82 B 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7Y1jh45L_8V.png
static.whatsapp.net/rsrc.php/v3/yB/r/ |
15 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
rYZqPCBaG70.png
static.whatsapp.net/rsrc.php/v3/yP/r/ |
2 KB 2 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
85 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WhatsApp (Instant Messenger)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| QRCode object| webpackJsonp function| $0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
static.whatsapp.net
uaa.whsasnae.com
2606:4700:3033::6815:4026
2a03:2880:f277:1cd:face:b00c:0:167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