www.hackrva.org
Open in
urlscan Pro
2606:4700:3036::681b:a6e3
Malicious Activity!
Public Scan
Submission: On December 08 via automatic, source openphish
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on August 16th 2020. Valid for: a year.
This is the only time www.hackrva.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 2606:4700:303... 2606:4700:3036::681b:a6e3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
hackrva.org
www.hackrva.org |
237 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.hackrva.org |
www.hackrva.org
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-16 - 2021-08-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.hackrva.org/ntcsos/NetVip/main/
Frame ID: 5A2659B7AB13A015698657FB04165328
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.hackrva.org/ntcsos/NetVip/main/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
www.hackrva.org/ntcsos/NetVip/main/assets/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon.ico
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
17 KB 2 KB |
Stylesheet
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
www.hackrva.org/ntcsos/NetVip/main/assets/js/ |
5 KB 996 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background-medium.jpg
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
215 KB 216 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check.png
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
577 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.png
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
globe.png
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
down.png
www.hackrva.org/ntcsos/NetVip/main/assets/img/ |
634 B 957 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated boolean| error_username boolean| error_password function| validateEmail function| validatePhoneNumber2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.hackrva.org/ | Name: PHPSESSID Value: 834b0e3e9db746ec492c2943ad98cb56 |
|
.hackrva.org/ | Name: __cfduid Value: d92e3e5100d54b3b2a8c767d576a46fb51607391004 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.hackrva.org
2606:4700:3036::681b:a6e3
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece
4442aacdd8b7f2368c235a92f6559b1d807231cb30c9409abe8a0f744dc9e8c5
49c49302da4f39abda66e8f68c77cb765f8ba3b9d019f9a2f98dc80e0a2df9a5
4d4054a533373a85d24d65f5290ca306133f3c22f0b2d7b71a742a277d0f7a49
76fda49610478440b5b123d15bb4d3510ab771ab27b0b881565887b7bcf6a0c6
847566a3fa53dae674a15ccd5dcb40087e2cf1935a1a9a6294702be812c0df53
c69a818f75b13a1a14452fea83d4c25b1e8606ea34095b32dabdfa0dce255eae
c8d904d2bb3904ebc2e3e6dfe37872553e2b5b41642111b9c97906b0c8b82386
f556fb3c64c1e81e81311450d0993f90dd52484410c8b19f7fe25501a1fb56c4
f940ec3ed8c80227019e6a43361a8963e8c398f57ea5f4e8e238c21bf42ec319