jenniferxxlane.gq
Open in
urlscan Pro
2606:4700:30::681b:8088
Malicious Activity!
Public Scan
Submission: On December 07 via manual from AU
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 6th 2018. Valid for: a year.
This is the only time jenniferxxlane.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:30:... 2606:4700:30::681b:8088 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
12 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
jenniferxxlane.gq |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
jenniferxxlane.gq
jenniferxxlane.gq |
2 MB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | jenniferxxlane.gq |
jenniferxxlane.gq
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2018-12-06 - 2019-12-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://jenniferxxlane.gq/000002/OneDrv/
Frame ID: CE725F04B117F42490945FAA8CB3EA3A
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jenniferxxlane.gq/000002/OneDrv/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
jenniferxxlane.gq/000002/OneDrv/bootstrap/css/ |
118 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
onedrive.png
jenniferxxlane.gq/000002/OneDrv/img/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
office.png
jenniferxxlane.gq/000002/OneDrv/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
outlook.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mail.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gmail.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aol.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
yahoo.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
jenniferxxlane.gq/000002/OneDrv/bootstrap/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
jenniferxxlane.gq/000002/OneDrv/bootstrap/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
on1.png
jenniferxxlane.gq/000002/OneDrv/img/ |
2 MB 2 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.jenniferxxlane.gq/ | Name: __cfduid Value: dce58c6811d3ea2170b74cb8a7bdcfffd1544146114 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jenniferxxlane.gq
2606:4700:30::681b:8088
3a108a7df48da361bd9f5217fd4fd21a70888d5b324b4e13ab80370804cd3b7d
53964478a7c634e8dad34ecc303dd8048d00dce4993906de1bacf67f663486ef
586542c749a46f816bac7f792a4390509f918f74a7b670377ad269b4cbbe9ad9
6a50d0c4ff1684740a74b77ef576d583600d1f9c730571c9d0d6827dde7c4115
7c6ebde9a0e00867e5517990bd4590ca067fcb735ddfc785c41ffb3adedacec2
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
8ebb311bb3652ddc5c78025cef665618b0c979098c9f5eacb9c452a5fdceb3c9
a2b00dc7e4ff8539cf742bf8d295c111dea08acf46328483d68640135887e70a
baad0cc991ef1ca7a4405615b827746e6a97dc6cb7045b544118c874ff1760ff
c010eda9ab4ad066a43d0b7fd4fe7f2be2e849af38db2e0b4af109ea7bcd5593
f5abe79538714148a390de1c7d7d568746510a32e14b37feacc4812155825558
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c