condemnedbison.build067.wpsandbox.app
Open in
urlscan Pro
104.207.228.95
Malicious Activity!
Public Scan
Submission: On October 13 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on November 30th 2021. Valid for: a year.
This is the only time condemnedbison.build067.wpsandbox.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 104.207.228.95 104.207.228.95 | 36444 (NEXCESS-NET) (NEXCESS-NET) | |
2 | 162.219.225.115 162.219.225.115 | 54113 (FASTLY) (FASTLY) | |
1 | 2600:9000:249... 2600:9000:2490:ae00:3:12d0:8d40:21 | 16509 (AMAZON-02) (AMAZON-02) | |
25 | 3 |
ASN16509 (AMAZON-02, US)
d35uxhjf90umnp.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
wpsandbox.app
condemnedbison.build067.wpsandbox.app |
688 KB |
2 |
amazon.co.jp
www.amazon.co.jp — Cisco Umbrella Rank: 14121 |
604 B |
1 |
cloudfront.net
d35uxhjf90umnp.cloudfront.net |
12 KB |
25 | 3 |
Domain | Requested by | |
---|---|---|
22 | condemnedbison.build067.wpsandbox.app |
condemnedbison.build067.wpsandbox.app
|
2 | www.amazon.co.jp |
condemnedbison.build067.wpsandbox.app
|
1 | d35uxhjf90umnp.cloudfront.net |
condemnedbison.build067.wpsandbox.app
|
25 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.build067.wpsandbox.app Sectigo RSA Domain Validation Secure Server CA |
2021-11-30 - 2022-11-30 |
a year | crt.sh |
www.amazon.co.jp DigiCert Global CA G2 |
2022-04-27 - 2023-04-26 |
a year | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://condemnedbison.build067.wpsandbox.app/amazon/
Frame ID: 4E22A5BAE09DD1BD01E172C879873ADC
Requests: 24 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
condemnedbison.build067.wpsandbox.app/amazon/ |
108 KB 51 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a9-tq-forensics.min.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
21 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
31YXrY93hfL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
61g+ivtVz9L._RC_11Fd9tJOdtL.css,11tfezETfFL.css,31Q3id-QR0L.css,31U9HrBLKmL.css_.css
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
130 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
01SdjaY0ZsL._RC_31jdWD+JB+L.css,41HbnNS3IWL.css_.css
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
36 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11pxFkbMcrL.css
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
61lemL2h6EL._RC_11Y+5x+kkTL.js,51KMV3Cz2XL.js,31x4ENTlVIL.js,31f4+QIEeqL.js,01N6xzIJxbL.js,518BI433aLL.js,01rpauTep4L.js,31QZSjMuoeL.js,61ofwvddDeL.js,01KsMxlPtzL.js_.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
310 KB 114 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
21G215oqvfL._RC_21OJDARBhQL.js,218GJg15I8L.js,31lucpmF4CL.js,2119M3Ks9rL.js,51UqOtnTrBL.js_.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
88 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
01wGDSlxwdL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
521 B 616 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
41ZsLLG3lqL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
81DRuMmUGiL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
325 KB 111 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
31jdfgcsPAL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
14 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
71jLD+iVN-L.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
255 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
71TrDQWcVBL.js.download
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
142 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ogo.jpg
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
BgnVchebDR5Ds4h.png
condemnedbison.build067.wpsandbox.app/amazon/cd_files/cd_file/ |
196 B 196 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
condemnedbison.build067.wpsandbox.app/amazon/ |
108 KB 51 KB |
Fetch
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
ap
www.amazon.co.jp/aaut/verify/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ap
www.amazon.co.jp/aaut/verify/ |
2 B 604 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
d35uxhjf90umnp.cloudfront.net/ |
37 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
uedata
condemnedbison.build067.wpsandbox.app/ap/ |
196 B 196 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
condemnedbison.build067.wpsandbox.app/amazon/ |
108 KB 51 KB |
Ping
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
31YXrY93hfL.js
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a9-tq-forensics.min.js
condemnedbison.build067.wpsandbox.app/amazon/cd_files/ |
21 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
condemnedbison.build067.wpsandbox.app/amazon/ |
108 KB 51 KB |
Ping
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)93 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation number| ue_t0 object| ue_csm number| ue_hob string| ue_err_chan string| ue_id string| ue_url number| ue_navtiming string| ue_mid string| ue_sid string| ue_sn string| ue_furl string| ue_surl number| ue_int number| ue_fcsn number| ue_urt string| ue_rpl_ns number| ue_ddq string| ue_fpf number| ue_sbuimp number| ue_ibft number| ue_fnt number| ue_swi function| ue_viz number| ue_hoe number| ue_ihb object| ue function| ueLogError object| ue_err number| ueinit function| uei function| ueh function| ues function| uet function| uex function| onLd function| onLdEnd function| onUl function| onstop number| aPageStart number| ue_ihe function| csa object| app object| amzn function| cf object| metadataList undefined| input undefined| authenticationFormList number| index object| fwcimCmd boolean| acicShouldSetup function| acicEventListener function| submitForm function| setAAToken function| getClientContext function| getEmailAddress function| isTestEmailPattern object| ue_mbl string| ue_pty string| ue_spty number| ue_adb number| ue_adb_rtla number| ue_wtc_c string| ue_aa_a number| ue_ibe function| _uess number| ue_fadb function| ue_isAdb object| ue_utils number| ue_unrt object| jQuery16404221013253856434 object| rquickExpr boolean| loginWithOTPState object| acic number| ue_adb_chk function| setImmediate function| clearImmediate number| __fwcimLoaded object| fwcim object| regeneratorRuntime object| SiegeCrypto object| pie object| ue_ext1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
condemnedbison.build067.wpsandbox.app/ | Name: csm-hit Value: tb:s-Q601HHYB7SWBGB5G5F7M|1665667278842&t:1665667279167&adb:adblk_no |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
condemnedbison.build067.wpsandbox.app
d35uxhjf90umnp.cloudfront.net
www.amazon.co.jp
104.207.228.95
162.219.225.115
2600:9000:2490:ae00:3:12d0:8d40:21
0debafeb8c39f3d5cdd9443cd018edee19d76125de4dc4765454f3008cb81a01
190cf4eff4954be867ee865259bcaa5433343e8a26820d62eda30a344d738ee6
2e5c4e5dd76d19bd957864a5485880b7dd5381be31835dc30dbb276d82652a89
432dff2bd6f663c6151a5947fa318a46463085d4f6e40761450e8b38fd0fe938
44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
527f891af136c47f7e3b3fb26e9c377847ac6cc376d50d36b938c4d7b75624ca
6267b22c78747f8db9476b502c900e874aebf89e1c658b5b3282f4c01f7a54c2
649711541f16bf4984c8a22fd9a994bb7ec747a3e67f9dff3116629c124bbf16
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
86f200cbac66cd6fada8e67b5e2238c6f1cfa07d56ac86b8d3d8fedf96085ce0
89100738027adb05eb7b50a09bad1f939c931e8153d6cbeb3c67c050748218ed
8e972a0e891628697b3d3897eba4c30a15b05c0645cb61a61877b56049bb27a0
a24d005a2b956c8bdcf7f60319a1905819175398dbe90e865830bbf54812366b
acecf30aabf2eff7ce2042082355fde6c791c05073f3877810370b3db42c1de1
b24c4b588fadee064cb031561bc4bdb118ce8c3c0349a269fc36507852a83b5b
c33ef9236635df158eb92f137954ae46ff2b8c65bce2c7e98e0c034b6b1d9611
c47789311a9bf93207d1e2e7a70941169c8611008c9d84afbd519a06b48066a9
d8ff1edb22f9c0298422d3459a15a8adc0138204001b7c53cf123d660f76129a
db3e58a8cbc47056530b58e562daee6c0cb7cc40bbc252a4256cf56a197dc94a
ea1ba1f03be040b21d9100c4f471999d355d584af7c1c525718d400a4d882251