startdownload.malwarequarantine.com Open in urlscan Pro
13.236.53.50  Malicious Activity! Public Scan

URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/
Submission: On December 13 via manual from HK — Scanned from AU

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 13.236.53.50, located in Sydney, Australia and belongs to AMAZON-02, US. The main domain is startdownload.malwarequarantine.com.
This is the only time startdownload.malwarequarantine.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishing Simulation (Internet)

Domain & IP information

IP Address AS Autonomous System
5 13.236.53.50 16509 (AMAZON-02)
5 1
Apex Domain
Subdomains
Transfer
5 malwarequarantine.com
startdownload.malwarequarantine.com
197 KB
5 1
Domain Requested by
5 startdownload.malwarequarantine.com startdownload.malwarequarantine.com
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/
Frame ID: 9EA2C3C4DF09F623501A6B66937769D0
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

404 - Quick Tip | Cofense

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

197 kB
Transfer

195 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/
3 KB
4 KB
Document
General
Full URL
http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
dda76f72291e2d7c70566ba3780514fd608107575da2079c1d29adef8e19a4b0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
no-store
Connection
Keep-Alive
Content-Type
text/html; charset=utf-8
Date
Tue, 13 Dec 2022 08:27:39 GMT
Expires
Fri, 01 Jan 1990 00:00:00 GMT
Keep-Alive
timeout=5, max=100
Pragma
no-cache
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
Status
404 Not Found
Transfer-Encoding
chunked
X-Content-Type-Options
nosniff
X-Download-Options
noopen noopen
X-Frame-Options
DENY
X-Permitted-Cross-Domain-Policies
none
X-Request-Id
1d6f3799-1e49-4d49-8e37-ed65d6cbe264
X-Runtime
0.025686
X-XSS-Protection
1; mode=block
phishme_spear_phishing_quick_tip_title.png
startdownload.malwarequarantine.com/images/www/
87 KB
87 KB
Image
General
Full URL
http://startdownload.malwarequarantine.com/images/www/phishme_spear_phishing_quick_tip_title.png
Requested by
Host: startdownload.malwarequarantine.com
URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
8079376a80d57cf462aad98f4d21542871852b4f4edc5fe3db2f2f1839fdc87d

Request headers

accept-language
en-AU,en;q=0.9
Referer
http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Date
Tue, 13 Dec 2022 08:27:39 GMT
Last-Modified
Tue, 11 Oct 2022 18:55:30 GMT
Server
Apache
ETag
"15b42-5eac6d1edcc80"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
88898
Expires
Tue, 13 Dec 2022 08:27:39 GMT
phishme_spear_phishing_quick_tip.png
startdownload.malwarequarantine.com/images/www/
93 KB
93 KB
Image
General
Full URL
http://startdownload.malwarequarantine.com/images/www/phishme_spear_phishing_quick_tip.png
Requested by
Host: startdownload.malwarequarantine.com
URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e106b2b8a45566462a60cecbe4e8f8c1ffb287e40222b1db28fc46e7da43766d

Request headers

accept-language
en-AU,en;q=0.9
Referer
http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Date
Tue, 13 Dec 2022 08:27:40 GMT
Last-Modified
Tue, 11 Oct 2022 18:55:30 GMT
Server
Apache
ETag
"17261-5eac6d1edcc80"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
94817
Expires
Tue, 13 Dec 2022 08:27:40 GMT
reporter.png
startdownload.malwarequarantine.com/images/www/
12 KB
12 KB
Image
General
Full URL
http://startdownload.malwarequarantine.com/images/www/reporter.png
Requested by
Host: startdownload.malwarequarantine.com
URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
b66912ec278b45ce43a38e270d8f94f39296787dd3857274002951d7b773761a

Request headers

accept-language
en-AU,en;q=0.9
Referer
http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Date
Tue, 13 Dec 2022 08:27:40 GMT
Last-Modified
Tue, 11 Oct 2022 18:55:30 GMT
Server
Apache
ETag
"3016-5eac6d1edcc80"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12310
Expires
Tue, 13 Dec 2022 08:27:40 GMT
Cofense_spear_phishing_quick_tip_ground.png
startdownload.malwarequarantine.com/images/www/
0
654 B
Image
General
Full URL
http://startdownload.malwarequarantine.com/images/www/Cofense_spear_phishing_quick_tip_ground.png
Requested by
Host: startdownload.malwarequarantine.com
URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

accept-language
en-AU,en;q=0.9
Referer
http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.98 Safari/537.36

Response headers

Date
Tue, 13 Dec 2022 08:27:40 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
404 Not Found
Connection
Keep-Alive
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
60c1d0fa-8a58-4370-84af-3a960da98ab2
Pragma
no-cache
X-Runtime
0.021069
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Download-Options
noopen, noopen
X-Frame-Options
DENY
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
no-store
Keep-Alive
timeout=5, max=100
Expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishing Simulation (Internet)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontentvisibilityautostatechange

0 Cookies

2 Console Messages

Source Level URL
Text
network error URL: http://startdownload.malwarequarantine.com/phishing/a58d0d/08622fe4-1aeb-4f43-9df0-02e8115c089d/?
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
network error URL: http://startdownload.malwarequarantine.com/images/www/Cofense_spear_phishing_quick_tip_ground.png
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block