rare-virtue.com
Open in
urlscan Pro
146.66.67.67
Malicious Activity!
Public Scan
Effective URL: https://rare-virtue.com/magusa/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.a...
Submission: On August 22 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 20th 2018. Valid for: 3 months.
This is the only time rare-virtue.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.11 67.199.248.11 | 395224 (BITLY-AS) (BITLY-AS - Bitly Inc) | |
8 | 146.66.67.67 146.66.67.67 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop LLC) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6813:c697 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
13 | 4 |
ASN32475 (SINGLEHOP-LLC - SingleHop LLC, US)
PTR: ip-146-66-67-67.siteground.com
rare-virtue.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
rare-virtue.com
rare-virtue.com |
119 KB |
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
48 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
bit.ly
1 redirects
bit.ly |
361 B |
13 | 5 |
Domain | Requested by | |
---|---|---|
8 | rare-virtue.com |
rare-virtue.com
|
3 | maxcdn.bootstrapcdn.com |
rare-virtue.com
|
1 | ajax.googleapis.com |
rare-virtue.com
|
1 | cdnjs.cloudflare.com |
rare-virtue.com
|
1 | bit.ly | 1 redirects |
13 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.rare-virtue.com Let's Encrypt Authority X3 |
2018-07-20 - 2018-10-18 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-04-14 - 2018-10-21 |
6 months | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2017-10-03 - 2018-10-13 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-08-07 - 2018-10-16 |
2 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rare-virtue.com/magusa/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: BF2ECCACC1D882D6BE4D8C5A65929466
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://bit.ly/2BAuS69
HTTP 301
https://rare-virtue.com/magusa/index.php Page URL
- https://rare-virtue.com/magusa/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bit.ly/2BAuS69
HTTP 301
https://rare-virtue.com/magusa/index.php Page URL
- https://rare-virtue.com/magusa/db.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://bit.ly/2BAuS69 HTTP 301
- https://rare-virtue.com/magusa/index.php
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
index.php
rare-virtue.com/magusa/ Redirect Chain
|
249 B 369 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
db.php
rare-virtue.com/magusa/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.2.0/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
log.png
rare-virtue.com/magusa/images/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dropbig.png
rare-virtue.com/magusa/images/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
to_view.jpg
rare-virtue.com/magusa/images/ |
20 KB 20 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
support.jpg
rare-virtue.com/magusa/images/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
.jpg
rare-virtue.com/magusa/images/ |
25 KB 25 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dot.png
rare-virtue.com/magusa/images/ |
203 B 396 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/fonts/ |
18 KB 18 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| drops0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bit.ly
cdnjs.cloudflare.com
maxcdn.bootstrapcdn.com
rare-virtue.com
146.66.67.67
209.197.3.15
2400:cb00:2048:1::6813:c697
2a00:1450:4001:819::200a
67.199.248.11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