wlvx.org
Open in
urlscan Pro
192.185.194.227
Malicious Activity!
Public Scan
Effective URL: http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/?sslchannel=true&sessionid=ZgCG8A...
Submission: On June 06 via manual from US
Summary
This is the only time wlvx.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 10 | 192.185.194.227 192.185.194.227 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
3 | 185.199.110.154 185.199.110.154 | 54113 (FASTLY) (FASTLY - Fastly) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
11 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 192-185-194-227.unifiedlayer.com
wlvx.org |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
wlvx.org
3 redirects
wlvx.org |
33 KB |
3 |
githubassets.com
github.githubassets.com |
104 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
10 | wlvx.org |
3 redirects
wlvx.org
|
3 | github.githubassets.com |
wlvx.org
|
1 | code.jquery.com |
wlvx.org
|
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.githubassets.com DigiCert SHA2 High Assurance Server CA |
2018-10-29 - 2020-11-02 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/?sslchannel=true&sessionid=ZgCG8AD7GFfJ63t4VfItQgcdX9mnTqZSGCyOccWTRbDXf62blLEc1RpZ0MnTcmMTZlHbxD4oPHm4Npf9
Frame ID: C501EB4E43FC7749D1799B3CD8A051C4
Requests: 7 HTTP requests in this frame
Frame:
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/Sign%20in%20to%20GitHub%20%C2%B7%20GitHub_files/saved_resource.html
Frame ID: 1A5E64786AC1D7D36112C88B73E47320
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://wlvx.org/files/fedwire
HTTP 301
http://wlvx.org/files/fedwire/ HTTP 302
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713 HTTP 301
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/ Page URL
- http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/?sslchannel=t... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://wlvx.org/files/fedwire
HTTP 301
http://wlvx.org/files/fedwire/ HTTP 302
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713 HTTP 301
http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/ Page URL
- http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/?sslchannel=true&sessionid=ZgCG8AD7GFfJ63t4VfItQgcdX9mnTqZSGCyOccWTRbDXf62blLEc1RpZ0MnTcmMTZlHbxD4oPHm4Npf9 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://wlvx.org/files/fedwire HTTP 301
- http://wlvx.org/files/fedwire/ HTTP 302
- http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713 HTTP 301
- http://wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/ Redirect Chain
|
206 B 420 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
/
wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frameworks-574e79274f191ff598834554443b5a1c.css
github.githubassets.com/assets/ |
133 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-0e25450ff46c1fbf61d504f9ffc4d784.css
github.githubassets.com/assets/ |
54 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
github-6bc45b1a77b90290f2c0d46acfa0fd56.css
github.githubassets.com/assets/ |
369 KB 70 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
office365.png
wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/src/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7997
wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/src/ |
508 B 750 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource.html
wlvx.org/files/fedwire/UKJCIAOSJDJkksdMMS/customer-IDPP00C713/authentic/Sign%20in%20to%20GitHub%20%C2%B7%20GitHub_files/ Frame 1A5E |
12 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
code.jquery.com/ Frame 1A5E |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
simple-expand.min.js
wlvx.org/cgi-sys/js/ Frame 1A5E |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x.png
wlvx.org/cgi-sys/images/ Frame 1A5E |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
github.githubassets.com
wlvx.org
185.199.110.154
192.185.194.227
205.185.208.52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