s3-ap-south-1.amazonaws.com
Open in
urlscan Pro
52.219.66.33
Malicious Activity!
Public Scan
Effective URL: https://s3-ap-south-1.amazonaws.com/s011gnos3b/index_csb_n.html?fbclid=40285006530084866&fbnam=AdobeFlashPlayer.dmg
Submission: On July 10 via api from DE
Summary
TLS certificate: Issued by DigiCert Baltimore CA-2 G2 on November 8th 2018. Valid for: a year.
This is the only time s3-ap-south-1.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fake Flash UpdateDomain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 173.239.8.164 173.239.8.164 | 27257 (WEBAIR-IN...) (WEBAIR-INTERNET - Webair Internet Development Company Inc.) | |
2 | 35.175.21.193 35.175.21.193 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 1 | 2606:4700:30:... 2606:4700:30::681f:4297 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 52.219.66.33 52.219.66.33 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
8 | 4 |
ASN27257 (WEBAIR-INTERNET - Webair Internet Development Company Inc., US)
PTR: icsvm3.webair.com
conybee.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-35-175-21-193.compute-1.amazonaws.com
usa.franciscus-ful.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
kkdojdkx.airstreamwashing.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: s3.ap-south-1.amazonaws.com
s3-ap-south-1.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
amazonaws.com
s3-ap-south-1.amazonaws.com |
20 KB |
2 |
franciscus-ful.com
usa.franciscus-ful.com |
3 KB |
2 |
conybee.com
conybee.com |
1 KB |
1 |
airstreamwashing.com
1 redirects
kkdojdkx.airstreamwashing.com |
484 B |
0 |
jquery.com
Failed
code.jquery.com Failed |
|
8 | 5 |
Domain | Requested by | |
---|---|---|
3 | s3-ap-south-1.amazonaws.com |
usa.franciscus-ful.com
s3-ap-south-1.amazonaws.com |
2 | usa.franciscus-ful.com |
conybee.com
usa.franciscus-ful.com |
2 | conybee.com |
conybee.com
|
1 | kkdojdkx.airstreamwashing.com | 1 redirects |
0 | code.jquery.com Failed |
s3-ap-south-1.amazonaws.com
|
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.ap-south-1.amazonaws.com DigiCert Baltimore CA-2 G2 |
2018-11-08 - 2020-03-10 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://s3-ap-south-1.amazonaws.com/s011gnos3b/index_csb_n.html?fbclid=40285006530084866&fbnam=AdobeFlashPlayer.dmg
Frame ID: 165EDF58D1BD28E94090C6659A881C52
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://conybee.com/ Page URL
- http://conybee.com/ Page URL
- http://usa.franciscus-ful.com/zcvisitor/63be2171-a340-11e9-9e4f-0a5f10ee3ee2?campaignid=6155c980-852f-11e9... Page URL
- http://usa.franciscus-ful.com/zcredirect?visitid=63be2171-a340-11e9-9e4f-0a5f10ee3ee2&type=js&browserWidth... Page URL
-
https://kkdojdkx.airstreamwashing.com/pontel/?fbcmid=4583&fbsuid=zr63be2171a34011e99e4f0a5f10ee3ee230890b7c765d493...
HTTP 302
https://s3-ap-south-1.amazonaws.com/s011gnos3b/index_csb_n.html?fbclid=40285006530084866&fbnam=AdobeFlashPlayer.dmg Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://conybee.com/ Page URL
- http://conybee.com/ Page URL
- http://usa.franciscus-ful.com/zcvisitor/63be2171-a340-11e9-9e4f-0a5f10ee3ee2?campaignid=6155c980-852f-11e9-a9b5-0a157bfa6bfc Page URL
- http://usa.franciscus-ful.com/zcredirect?visitid=63be2171-a340-11e9-9e4f-0a5f10ee3ee2&type=js&browserWidth=1600&browserHeight=1200&iframeDetected=false Page URL
-
https://kkdojdkx.airstreamwashing.com/pontel/?fbcmid=4583&fbsuid=zr63be2171a34011e99e4f0a5f10ee3ee230890b7c765d493ca01bccf8e25a16f60396422ec7634965cd
HTTP 302
https://s3-ap-south-1.amazonaws.com/s011gnos3b/index_csb_n.html?fbclid=40285006530084866&fbnam=AdobeFlashPlayer.dmg Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
conybee.com/ |
636 B 628 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
Cookie set
/
conybee.com/ |
220 B 614 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
63be2171-a340-11e9-9e4f-0a5f10ee3ee2
usa.franciscus-ful.com/zcvisitor/ |
1014 B 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zcredirect
usa.franciscus-ful.com/ |
480 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index_csb_n.html
s3-ap-south-1.amazonaws.com/s011gnos3b/ Redirect Chain
|
9 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
topbar.png
s3-ap-south-1.amazonaws.com/s011gnos3b/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
s3-ap-south-1.amazonaws.com/s011gnos3b/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.4.1.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- code.jquery.com
- URL
- https://code.jquery.com/jquery-3.4.1.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fake Flash Update3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
conybee.com
kkdojdkx.airstreamwashing.com
s3-ap-south-1.amazonaws.com
usa.franciscus-ful.com
code.jquery.com
173.239.8.164
2606:4700:30::681f:4297
35.175.21.193
52.219.66.33
5fb788479069416a864a98fb67586db346e64648bad45f9770ee8ef41fac7571
93e4b338e4bc391ee401bda736f1d1a6cc2d2b737cfc7b3b3adf1b20f11100f1
c892ede66daf7312088c3cacc68ccc3fb35cac385657d8028609c0d49aaf540f
d7299ff66ddd50883c6a58afb79cc84f8a9bcb729696292b37870a7cbff0e0fd
d77c59313c70238cc9594b98948baae96a78e91beb22ef4db6561e016e3b4178