runescape.wtf
Open in
urlscan Pro
2606:4700:3034::681b:9c32
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On February 19 via api from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on February 17th 2020. Valid for: 8 months.
This is the only time runescape.wtf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Runescape (Online) Generic (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700:303... 2606:4700:3034::681b:9c32 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
runescape.wtf
runescape.wtf |
292 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | runescape.wtf |
runescape.wtf
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.runescape.com |
secure.runescape.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-17 - 2020-10-09 |
8 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://runescape.wtf/m=weblogin/loginws?mod=1
Frame ID: 9AE26F941051ACC5169CCD3552CB1BE8
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Create an account
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
loginws
runescape.wtf/m=weblogin/ |
61 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor-129.css
runescape.wtf/m=weblogin/rfiles/ |
111 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-129.css
runescape.wtf/m=weblogin/rfiles/ |
298 KB 82 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
runescape.png
runescape.wtf/m=weblogin/rfiles/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tile.jpg
runescape.wtf/m=weblogin/rfiles/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vista.jpg
runescape.wtf/m=weblogin/rfiles/ |
185 KB 186 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.svg
runescape.wtf/m=weblogin/rfiles/ |
429 B 372 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google.svg
runescape.wtf/m=weblogin/rfiles/ |
763 B 412 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
25 KB 25 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
59 KB 59 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Runescape (Online) Generic (Online) Microsoft (Consumer)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| cGvyaLSNWxy object| LDwpldcuU2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
runescape.wtf/ | Name: PHPSESSID Value: c87fe1828cb2384c53af56e987425a26 |
|
.runescape.wtf/ | Name: __cfduid Value: d0e43117c450c4196b31a00e36dd13ac71582139955 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
runescape.wtf
2606:4700:3034::681b:9c32
0076d8f697e9ec56c222d757e056947696cf6a1da8222f8627560a4822ae11cd
20c865ce77047a5c5803795945e97ee228b3a86bc72c6ac1779c96681e4ebac3
480f0c53edc1e4dfa14bc1479b8a298ecb4f4c5a92ba2917a3612eb8b242d13d
4a32072c69079ffc44b4947317ec7144a1aef8a25a5ec9a0deaecd8196c1aadb
4de6e0c46e6f0d4117c7eee3933d450027542cf8c87e1ae3f813ef93eea43b87
6865695148fa8984d5d3d639003a358bf01f2b89934b861d35d72fad4f341646
698b2c644c24b51711a9444eed3c87ccec4b82c0d941cc6a2089fd51df0e6e2f
993c2933d28ec8748259d20a3467f65a167953524c724e6ba030fc67b8568a37
e48e93362cdac23391f9bb460098291904bcc73fb4f57446e22701860a07ed89
f5b87209caa2e310f5d31890ce945dd194e12ada9839d8d5571ac994e477335a