et.dalmacorp.com
Open in
urlscan Pro
104.250.178.18
Malicious Activity!
Public Scan
Effective URL: https://et.dalmacorp.com/tt/china/bold/upload/en.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand....
Submission: On August 05 via manual from IN
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 9th 2020. Valid for: 3 months.
This is the only time et.dalmacorp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.35 167.89.118.35 | 11377 (SENDGRID) (SENDGRID) | |
4 | 104.250.178.18 104.250.178.18 | 3223 (VOXILITY) (VOXILITY) | |
4 | 1 |
ASN11377 (SENDGRID, US)
PTR: o16789118x35.outbound-mail.sendgrid.net
u5521270.ct.sendgrid.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
dalmacorp.com
et.dalmacorp.com |
47 KB |
1 |
sendgrid.net
1 redirects
u5521270.ct.sendgrid.net |
284 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
4 | et.dalmacorp.com |
et.dalmacorp.com
|
1 | u5521270.ct.sendgrid.net | 1 redirects |
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
et.dalmacorp.com Let's Encrypt Authority X3 |
2020-07-09 - 2020-10-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://et.dalmacorp.com/tt/china/bold/upload/en.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=amVmZnJleS50YW5Ac2MuY29t&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: C77E7AEFE3E758B32445E14E7E351554
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://u5521270.ct.sendgrid.net/ls/click?upn=9wWta4jgOP81ImHsLPTeXZn9iV3E8GnrNoviV2dZ1VDMWFF0fKs8bN5vpt4OQ-2...
HTTP 302
https://et.dalmacorp.com/tt/china/bold/upload/index.php?email=jeffrey.tan@sc.com Page URL
- https://et.dalmacorp.com/tt/china/bold/upload/en.php?rand=13InboxLightaspxn.1774256418&fid.4.12528996... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://u5521270.ct.sendgrid.net/ls/click?upn=9wWta4jgOP81ImHsLPTeXZn9iV3E8GnrNoviV2dZ1VDMWFF0fKs8bN5vpt4OQ-2BfWcrVHwZbff6tE5sGqU17WQll4YcaXpL-2FFRPnOQq-2B-2BFQ1sSgS6s0FkCIG4neA4gSwQ9eMy_KSi-2Fx-2FiQASeWdmgv2ErPzXlTj8Xha-2B4A7qVjSeo6BULwQzKsEYY0TTwzL6Ql24XQRipGe1PornJ59CrqgO52w3taRltTxytAkjoJVt0ETpiFfl-2FnErBpREbOMysG0I4P-2FZq657wn8l5QCVP4e4qp83mMAfOL1rPkOJ7PSgDJUfPizlVzSq24UgnbTLJgV3spnqL58mXut5IEiKVFe5SGzQ-3D-3D
HTTP 302
https://et.dalmacorp.com/tt/china/bold/upload/index.php?email=jeffrey.tan@sc.com Page URL
- https://et.dalmacorp.com/tt/china/bold/upload/en.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=amVmZnJleS50YW5Ac2MuY29t&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://u5521270.ct.sendgrid.net/ls/click?upn=9wWta4jgOP81ImHsLPTeXZn9iV3E8GnrNoviV2dZ1VDMWFF0fKs8bN5vpt4OQ-2BfWcrVHwZbff6tE5sGqU17WQll4YcaXpL-2FFRPnOQq-2B-2BFQ1sSgS6s0FkCIG4neA4gSwQ9eMy_KSi-2Fx-2FiQASeWdmgv2ErPzXlTj8Xha-2B4A7qVjSeo6BULwQzKsEYY0TTwzL6Ql24XQRipGe1PornJ59CrqgO52w3taRltTxytAkjoJVt0ETpiFfl-2FnErBpREbOMysG0I4P-2FZq657wn8l5QCVP4e4qp83mMAfOL1rPkOJ7PSgDJUfPizlVzSq24UgnbTLJgV3spnqL58mXut5IEiKVFe5SGzQ-3D-3D HTTP 302
- https://et.dalmacorp.com/tt/china/bold/upload/index.php?email=jeffrey.tan@sc.com
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
et.dalmacorp.com/tt/china/bold/upload/ Redirect Chain
|
273 B 481 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
en.php
et.dalmacorp.com/tt/china/bold/upload/ |
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mail.png
et.dalmacorp.com/tt/china/bold/upload/files/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
id.png
et.dalmacorp.com/tt/china/bold/upload/files/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| count0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
et.dalmacorp.com
u5521270.ct.sendgrid.net
104.250.178.18
167.89.118.35
272c9a8ee9faf4bb46b70403cda777ce98f24fd48b2083ee133478461261d5dd
36bada7bc3385f98bb9cc8d70c3f96a8fb63508f77cca1108dfba94257208955
e11a6773a10302f1d4a38c34b58395884c4ad628ff0f7842aa03fba5e8e50ab1