enormous-deep-elephant.glitch.me Open in urlscan Pro
23.21.132.238  Malicious Activity! Public Scan

URL: https://enormous-deep-elephant.glitch.me/marathoooon.html
Submission Tags: falconsandbox
Submission: On September 20 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 23.21.132.238, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is enormous-deep-elephant.glitch.me.
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time enormous-deep-elephant.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 23.21.132.238 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 2620:1ec:46::60 8068 (MICROSOFT...)
3 4
Apex Domain
Subdomains
Transfer
1 msauth.net
aadcdn.msauth.net — Cisco Umbrella Rank: 1078
17 KB
1 googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 293
30 KB
1 glitch.me
enormous-deep-elephant.glitch.me
246 KB
3 3
Domain Requested by
1 aadcdn.msauth.net enormous-deep-elephant.glitch.me
1 ajax.googleapis.com enormous-deep-elephant.glitch.me
1 enormous-deep-elephant.glitch.me
3 3

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2022-02-01 -
2023-03-02
a year crt.sh
upload.video.google.com
GTS CA 1C3
2022-08-29 -
2022-11-21
3 months crt.sh
aadcdn.msauth.net
DigiCert SHA2 Secure Server CA
2022-08-23 -
2023-08-23
a year crt.sh

This page contains 1 frames:

Primary Page: https://enormous-deep-elephant.glitch.me/marathoooon.html
Frame ID: E044BF144AD0AB3ED933E11D27FC233B
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Microsoft | Login

Detected technologies

Overall confidence: 100%
Detected patterns
  • /([\d.]+)/jquery(?:\.min)?\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

3
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

293 kB
Transfer

387 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request marathoooon.html
enormous-deep-elephant.glitch.me/
245 KB
246 KB
Document
General
Full URL
https://enormous-deep-elephant.glitch.me/marathoooon.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.21.132.238 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-21-132-238.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
b56311d443dc2288bfd45b40ad04dd4dd3823b42c6dd66f4e4e71514756954a8

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
251302
content-type
text/html; charset=utf-8
date
Tue, 20 Sep 2022 20:36:29 GMT
etag
"b1e2e9c21fb54f39b91f336d25f69623"
last-modified
Tue, 20 Sep 2022 11:59:11 GMT
server
AmazonS3
x-amz-id-2
JukKa0NzKJydHrcFWnKR49ACGlLHUCtqT/AmQflIQNcKJV7PL4JAqojmVEYxKg3aCoi8Rgvwxgw=
x-amz-request-id
TA9QDJGWWSFQ0DMB
x-amz-version-id
JSLhcqZ3Jea__vQjlsr7TzCBxRWicqXs
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/
84 KB
30 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Requested by
Host: enormous-deep-elephant.glitch.me
URL: https://enormous-deep-elephant.glitch.me/marathoooon.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:811::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://enormous-deep-elephant.glitch.me/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Tue, 20 Sep 2022 20:35:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
34
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/hosted-libraries-pushers
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
30028
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="hosted-libraries-pushers"
vary
Accept-Encoding
report-to
{"group":"hosted-libraries-pushers","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/hosted-libraries-pushers"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Sep 2023 20:35:56 GMT
favicon_a_eupayfgghqiai7k9sol6lg2.ico
aadcdn.msauth.net/ests/2.1/content/images/
17 KB
17 KB
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
Requested by
Host: enormous-deep-elephant.glitch.me
URL: https://enormous-deep-elephant.glitch.me/marathoooon.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:46::60 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://enormous-deep-elephant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Tue, 20 Sep 2022 20:36:29 GMT
content-md5
EuPayFgGHQiAI7K9SOL6lg==
x-cache
TCP_HIT
content-length
17174
x-ms-lease-status
unlocked
last-modified
Fri, 02 Nov 2018 20:25:25 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D6410152A9D7E1
x-azure-ref
0TiQqYwAAAAAvt6YqNkRkSI9Tnm0Xe53mTE9OMjFFREdFMTgxMwAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-type
image/x-icon
access-control-allow-origin
*
x-ms-request-id
de67e8ad-801e-0027-0ac8-c9774e000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
truncated
/
16 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
90355719997bdae64237fba1548abd6a2eb0f4545baa1dd4488e3080af827db5

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Content-Type
image/gif
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6cf799f2f4976f33994548a741b39d05097c35e3c991fb4dc6db5e66f05b4b2b

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
17 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

35 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| rot13 function| WriteHTMLtoJS string| file function| $ function| jQuery function| _0x2e46 function| _0x406a function| _0x536086 string| title string| si string| error string| na string| co string| cayr string| mic1 string| next string| ep string| msg string| mic string| fp2 string| submitbtn string| mic2 string| loadtext string| sio string| c2022 string| pst

0 Cookies

2 Console Messages

Source Level URL
Text
javascript warning URL: https://enormous-deep-elephant.glitch.me/marathoooon.html(Line 4)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://enormous-deep-elephant.glitch.me/marathoooon.html(Line 4)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.