drive-track.ftp.sh
Open in
urlscan Pro
162.19.228.234
Malicious Activity!
Public Scan
Effective URL: https://drive-track.ftp.sh/Find?sslchannel=true&sessionid=BmwxSvbPEFXllavyAy5lXnzficrJCY4u38hAriuKBCakgHJOfPKdMRjxl3RDT13zs...
Submission: On December 19 via automatic, source certstream-suspicious — Scanned from FR
Summary
TLS certificate: Issued by R3 on December 19th 2022. Valid for: 3 months.
This is the only time drive-track.ftp.sh was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: UPS (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 162.19.228.234 162.19.228.234 | 16276 (OVH) (OVH) | |
12 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
ftp.sh
1 redirects
drive-track.ftp.sh |
892 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
13 | drive-track.ftp.sh |
1 redirects
drive-track.ftp.sh
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
drive-track.ftp.sh R3 |
2022-12-19 - 2023-03-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://drive-track.ftp.sh/Find?sslchannel=true&sessionid=BmwxSvbPEFXllavyAy5lXnzficrJCY4u38hAriuKBCakgHJOfPKdMRjxl3RDT13zsA2QMhK2w9yymp78YJgyAnRC33cjTibEbtfnngCO3DFK8Cp79Goy7LtP4p0AzlyTAm
Frame ID: 5862EEA0513DB3CEC51350F022C3BB19
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Global Shipping & Logistics Services | UPS - United StatesPage URL History Show full URLs
-
https://drive-track.ftp.sh/
HTTP 302
https://drive-track.ftp.sh/Find?sslchannel=true&sessionid=BmwxSvbPEFXllavyAy5lXnzficrJCY4u38hAriuKBCakg... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://drive-track.ftp.sh/
HTTP 302
https://drive-track.ftp.sh/Find?sslchannel=true&sessionid=BmwxSvbPEFXllavyAy5lXnzficrJCY4u38hAriuKBCakgHJOfPKdMRjxl3RDT13zsA2QMhK2w9yymp78YJgyAnRC33cjTibEbtfnngCO3DFK8Cp79Goy7LtP4p0AzlyTAm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Find
drive-track.ftp.sh/ Redirect Chain
|
21 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ups_0021.css
drive-track.ftp.sh/us_assetz/css/ |
108 KB 108 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ups1.css
drive-track.ftp.sh/us_assetz/css/ |
229 KB 229 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
drive-track.ftp.sh/us_assetz/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ups-logo.svg
drive-track.ftp.sh/us_assetz/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
drive-track.ftp.sh/us_assetz/js/ |
266 KB 266 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mask.js
drive-track.ftp.sh/us_assetz/js/ |
23 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
social.jpg
drive-track.ftp.sh/us_assetz/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Roboto-Regular.woff
drive-track.ftp.sh/us_assetz/fonts/ |
92 KB 92 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 3 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Roboto-Medium.woff
drive-track.ftp.sh/us_assetz/fonts/ |
92 KB 92 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Roboto-Bold.woff
drive-track.ftp.sh/us_assetz/fonts/ |
26 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
20220401-JTBD-US-MAEVE.webp
drive-track.ftp.sh/us_assetz/img/ |
41 KB 42 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: UPS (Transportation)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
drive-track.ftp.sh/ | Name: PHPSESSID Value: d852798ce0f5720a6e4b5e53eddcc862 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
drive-track.ftp.sh
162.19.228.234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