gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
Open in
urlscan Pro
157.230.143.51
Malicious Activity!
Public Scan
Effective URL: https://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78
Submission: On August 19 via manual from TR — Scanned from US
Summary
TLS certificate: Issued by R10 on August 15th 2024. Valid for: 3 months.
This is the only time gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online) Microsoft (Consumer) OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2607:f8b0:400... 2607:f8b0:4006:80a::2003 | 15169 (GOOGLE) (GOOGLE) | |
3 3 | 94.156.65.137 94.156.65.137 | 394711 (LIMENET) (LIMENET) | |
2 3 | 157.230.143.51 157.230.143.51 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 1 | 2607:f8b0:400... 2607:f8b0:4006:81f::2004 | 15169 (GOOGLE) (GOOGLE) | |
2 | 2607:f8b0:400... 2607:f8b0:4006:81c::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:2800:11f... 2606:2800:11f:17a5:191a:18d5:537:22f9 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 8 |
ASN14061 (DIGITALOCEAN-ASN, US)
j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website | |
tjzqrvx898w.qufucndyxiensdfjhkjphgav.website | |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website |
ASN15133 (EDGECAST, US)
spoppe-b.azureedge.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1832 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 4508 |
56 KB |
3 |
ohwqzljwfqhluvt.com
3 redirects
rel1vlw.ohwqzljwfqhluvt.com |
695 B |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
2 KB |
2 |
qufucndyxiensdfjhkjphgav.website
1 redirects
tjzqrvx898w.qufucndyxiensdfjhkjphgav.website gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website |
68 KB |
2 |
google.co.ug
2 redirects
www.google.co.ug — Cisco Umbrella Rank: 21774 |
2 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 336 |
7 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
81 KB |
1 |
azureedge.net
spoppe-b.azureedge.net — Cisco Umbrella Rank: 18465 |
1 KB |
1 |
google.com
1 redirects
www.google.com — Cisco Umbrella Rank: 10 |
25 B |
1 |
lbwkvdwvdgymnxsdfstgrsz.website
1 redirects
j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website |
295 B |
0 |
wikipedia.org
Failed
www.wikipedia.org Failed |
|
10 | 11 |
Domain | Requested by | |
---|---|---|
3 | rel1vlw.ohwqzljwfqhluvt.com | 3 redirects |
2 | maxcdn.bootstrapcdn.com |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
2 | fonts.googleapis.com |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
2 | www.google.co.ug | 2 redirects |
1 | stackpath.bootstrapcdn.com |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
1 | cdnjs.cloudflare.com |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
1 | code.jquery.com |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
1 | spoppe-b.azureedge.net |
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
|
1 | gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website | |
1 | www.google.com | 1 redirects |
1 | tjzqrvx898w.qufucndyxiensdfjhkjphgav.website | 1 redirects |
1 | j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website | 1 redirects |
0 | www.wikipedia.org Failed | |
10 | 13 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qufucndyxiensdfjhkjphgav.website R10 |
2024-08-15 - 2024-11-13 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
bootstrapcdn.com WE1 |
2024-07-23 - 2024-10-21 |
3 months | crt.sh |
*.vo.msecnd.net DigiCert SHA2 Secure Server CA |
2024-06-06 - 2025-06-06 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-07-31 - 2024-10-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78
Frame ID: 884025398F4CB421935FAD5E145A32FC
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
OneDrivePage URL History Show full URLs
-
https://www.google.co.ug/url?url=https://fogdecnjd&oqat=hinfqviu&oqat=hinfqviu&fnlrszm=bkyqshnwdh&fqj...
HTTP 302
https://www.google.co.ug/amp/rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
http://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 307
https://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
https://j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website/b601109AAd9af2944852e5a1700bdabbca968b94ab60j66b9fdb6d0272d68f3e2db78 HTTP 301
https://www.google.com/amp/gunvorgroup-drive.lbwkvdwvdgymnxsdfstgrsz.website/appd9af2944852e5a1700b... HTTP 307
http://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 301
https://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
https://tjzqrvx898w.qufucndyxiensdfjhkjphgav.website/b6011mntee1b919005b77c90b9af4d6d66946ed93b60j66b9fdb6d0272d68f3e2db78 HTTP 301
https://www.google.com/amp/gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9a... HTTP 302
http://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78 HTTP 307
https://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78 Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.google.co.ug/url?url=https://fogdecnjd&oqat=hinfqviu&oqat=hinfqviu&fnlrszm=bkyqshnwdh&fqjmqd=fnlrszm&fnlrszm=bkyqshnwdh&&oqat=hinfqviu&oqat=hinfqviu&fnlrszm=bkyqshnwdh&fqjmqd=fnlrszm&fnlrszm=bkyqshnwdh&fqjmqd=fnlrszm&ylwsw=fogdecnjd&q=amp/rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp&oqat=hinfqviu&oqat=hinfqviu&fnlrszm=bkyqshnwdh&fqjmqd=fnlrszm&ylwsw=fogdecnjd&oqat=hinfqviu&oqat=hinfqviu&fnlrszm=bkyqshnwdh
HTTP 302
https://www.google.co.ug/amp/rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
http://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 307
https://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
https://j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website/b601109AAd9af2944852e5a1700bdabbca968b94ab60j66b9fdb6d0272d68f3e2db78 HTTP 301
https://www.google.com/amp/gunvorgroup-drive.lbwkvdwvdgymnxsdfstgrsz.website/appd9af2944852e5a1700bdabbca968b94a/66b9fdb6d0272d68f3e2db78 HTTP 307
http://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 301
https://rel1vlw.ohwqzljwfqhluvt.com/b7q4npryp HTTP 302
https://tjzqrvx898w.qufucndyxiensdfjhkjphgav.website/b6011mntee1b919005b77c90b9af4d6d66946ed93b60j66b9fdb6d0272d68f3e2db78 HTTP 301
https://www.google.com/amp/gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78 HTTP 302
http://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78 HTTP 307
https://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/66b9fdb6d0272d68f3e2db78 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 11- https://gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/favicon.ico HTTP 301
- https://wikipedia.com/ HTTP 301
- https://www.wikipedia.org/
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
66b9fdb6d0272d68f3e2db78
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website/appe1b919005b77c90b9af4d6d66946ed93/ Redirect Chain
|
68 KB 68 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
0 0 |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
20 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pdf.png
spoppe-b.azureedge.net/files/fabric-cdn-prod_20211104.001/assets/item-types/32_2x/ |
724 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/ |
50 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 2 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
www.wikipedia.org/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.wikipedia.org
- URL
- https://www.wikipedia.org/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online) Microsoft (Consumer) OneDrive (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.google.co.ug/ | Name: NID Value: 516=IjqKV9qyfDd0x2nRQhyWw3VCgWafy-z4FN6p5Topu5zwk_KMsh2BE8b_-QlebV8xAsHLF1iTHxhWBHgkvIY4WO6IvMtVaIrLUk-4OaOHB9N2b2EsiU82LQoj9K6LyV8-VTwFQvmLIPYfeaTlfy3fnyRylhZKSr4vZQzRlFRB5Vo7qo8BN6QPAA |
|
.google.com/ | Name: NID Value: 516=NcjckZxjNRpdcip4rjNSJfS7clwNrThvqpusIFdE6T9egclrTUGfcOi3_wWdo_u_kxYpUQp99zSDV5Raop4KgF8MRYlniGcs8_-1VxRMuHXVHLT_HriluCUsbBtLH2b2Pf-W81rNmG2MoXNgi2qnkHV141T86LFmvurYu3O4vP_Wl9uRWnfxMQ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
gunvorgroup-drive.qufucndyxiensdfjhkjphgav.website
j9zmbldpohz.lbwkvdwvdgymnxsdfstgrsz.website
maxcdn.bootstrapcdn.com
rel1vlw.ohwqzljwfqhluvt.com
spoppe-b.azureedge.net
stackpath.bootstrapcdn.com
tjzqrvx898w.qufucndyxiensdfjhkjphgav.website
www.google.co.ug
www.google.com
www.wikipedia.org
www.wikipedia.org
157.230.143.51
2606:2800:11f:17a5:191a:18d5:537:22f9
2606:4700::6811:190e
2606:4700::6812:acf
2606:4700::6812:bcf
2607:f8b0:4006:80a::2003
2607:f8b0:4006:81c::200a
2607:f8b0:4006:81f::2004
2a04:4e42:600::649
94.156.65.137
29b7a9358abdc68c51db5a5af4a4f4e2e041a67527adee2366b1f84f116fe9a5
2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
65d68f096eae4d0fa0dbb74b245f94abfbe00c8ed6236f8c66341ee028ebe008
825de044d5ac6442a094ff95099f9f67e9249a8110a2fbd57128285776632adb
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
b4e544b010077ceacf159dfdf566b37d06f8ab3c151e9561720e392b8f1ea38e
cf5916e86bb18875db4e12ee5e799cce7b23bc1cd1ad721fb65d3879de629bec
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
edaaf59a9ff9e1cc96d7e5002a036ebe0a8b23b2709aaa31efd8c58e1be987d8