mobilefbook-login-com.filesusr.com
Open in
urlscan Pro
34.102.176.152
Malicious Activity!
Public Scan
Submission: On June 23 via automatic, source phishtank
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 28th 2020. Valid for: 6 months.
This is the only time mobilefbook-login-com.filesusr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 34.102.176.152 34.102.176.152 | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a03:2880:f01... 2a03:2880:f01c:8012:face:b00c:0:3 | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 144.217.92.58 144.217.92.58 | 16276 (OVH) (OVH) | |
1 | 2a03:2880:f11... 2a03:2880:f11c:8183:face:b00c:0:25de | 32934 (FACEBOOK) (FACEBOOK) | |
10 | 5 |
ASN15169 (GOOGLE, US)
PTR: 152.176.102.34.bc.googleusercontent.com
mobilefbook-login-com.filesusr.com |
ASN16276 (OVH, FR)
PTR: 58.ip-144-217-92.net
comohackearfacebook.com.mx |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
fbcdn.net
static.xx.fbcdn.net |
28 KB |
1 |
facebook.com
facebook.com |
921 B |
1 |
comohackearfacebook.com.mx
comohackearfacebook.com.mx |
2 KB |
1 |
filesusr.com
mobilefbook-login-com.filesusr.com |
181 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
2 | static.xx.fbcdn.net |
mobilefbook-login-com.filesusr.com
|
1 | facebook.com |
mobilefbook-login-com.filesusr.com
|
1 | comohackearfacebook.com.mx |
mobilefbook-login-com.filesusr.com
|
1 | mobilefbook-login-com.filesusr.com | |
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.filesusr.com Sectigo RSA Domain Validation Secure Server CA |
2020-05-28 - 2020-11-24 |
6 months | crt.sh |
*.facebook.com DigiCert SHA2 High Assurance Server CA |
2020-05-14 - 2020-08-05 |
3 months | crt.sh |
www.comohackearfacebook.com.mx Let's Encrypt Authority X3 |
2020-05-09 - 2020-08-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mobilefbook-login-com.filesusr.com/html/33e50a_3a20eac0593bd610f2a6865c7cc27af4.html?MzQ2NzkyNg==facebook/d=sn&**aHR0cHM6Ly9ocmVmLmxpLz9odHRwczovL3d3dy5mYWNlYm9vay5jb20=**WDdybjhaWVhxQUdrWGg2Vg==*RmFjZWJvb2sgRXNwYcOxb2w=*
Frame ID: CD27A17FAAC85D24C1E35C06737FF039
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Google Cloud (CDN) Expand
Detected patterns
- headers via /^1\.1 google$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
33e50a_3a20eac0593bd610f2a6865c7cc27af4.html
mobilefbook-login-com.filesusr.com/html/ |
181 KB 181 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8MJQYW2UQPc.css
static.xx.fbcdn.net/rsrc.php/v3/yD/l/0,cross/ |
112 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2T_OAQeGk3Y.css
static.xx.fbcdn.net/rsrc.php/v3/yS/l/0,cross/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sAcaU2FJdDD.js
static.xx.fbcdn.net/rsrc.php/v3/yF/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook.png
comohackearfacebook.com.mx/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hsts-pixel.gif
facebook.com/security/ |
43 B 921 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
0TAztId_a4S.js
static.xx.fbcdn.net/rsrc.php/v3/yY/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
XxgXzY84ie6.js
static.xx.fbcdn.net/rsrc.php/v3iDZk4/yn/l/es_LA/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
DNZawPpXNpn.js
static.xx.fbcdn.net/rsrc.php/v3irpj4/yE/l/es_LA/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
056eahAqxba.js
static.xx.fbcdn.net/rsrc.php/v3/yB/r/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yF/r/sAcaU2FJdDD.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yY/r/0TAztId_a4S.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3iDZk4/yn/l/es_LA/XxgXzY84ie6.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3irpj4/yE/l/es_LA/DNZawPpXNpn.js?_nc_x=Ij3Wp8lg5Kz
- Domain
- static.xx.fbcdn.net
- URL
- https://static.xx.fbcdn.net/rsrc.php/v3/yB/r/056eahAqxba.js?_nc_x=Ij3Wp8lg5Kz
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| tmpURL object| llegaron object| uno object| dos string| tres object| cuatro object| cinco string| regreso string| urlfin string| idfb string| detector object| lang string| enblanco object| myString object| myArray string| email string| ip function| envFlush object| Env number| _DEV function| CavalryLogger function| updateOrientation undefined| bigPipe0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
comohackearfacebook.com.mx
facebook.com
mobilefbook-login-com.filesusr.com
static.xx.fbcdn.net
static.xx.fbcdn.net
144.217.92.58
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
34.102.176.152
0569d040cef3d3f9cfb9a77b4bc99c4c347b3748f9f79b1bfabff37db596951c
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
55b85359d789590cd9ee87f5da0d41dc7922549541d1c0e34bd3ad870a84099e
569d9611c2270f4466592c35d24615e4326c9e7a050e93aa293c21d7cf775b36
5f0887e548afc10f424c00a47a5626c8d3ab0c26a61a184a7c5a19da916af11f