vstroom.theworkpc.com
Open in
urlscan Pro
199.195.248.170
Malicious Activity!
Public Scan
Effective URL: https://vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/55781325bbc94985441grapjm9cs3?s=def50200e81dc66be64c925ac5553685e83c...
Submission: On May 20 via api from CH
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 17th 2019. Valid for: 3 months.
This is the only time vstroom.theworkpc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:30:... 2606:4700:30::681f:5376 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
9 | 199.195.248.170 199.195.248.170 | 53667 (PONYNET) (PONYNET - FranTech Solutions) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
10 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
west.treegadgetz.com |
ASN53667 (PONYNET - FranTech Solutions, US)
vstroom.theworkpc.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
theworkpc.com
vstroom.theworkpc.com |
468 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
treegadgetz.com
1 redirects
west.treegadgetz.com |
1014 B |
10 | 3 |
Domain | Requested by | |
---|---|---|
9 | vstroom.theworkpc.com |
vstroom.theworkpc.com
code.jquery.com |
1 | code.jquery.com |
vstroom.theworkpc.com
|
1 | west.treegadgetz.com | 1 redirects |
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vstroom.theworkpc.com Let's Encrypt Authority X3 |
2019-05-17 - 2019-08-15 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/55781325bbc94985441grapjm9cs3?s=def50200e81dc66be64c925ac5553685e83cc940c2737b8fd735c1128faf93224fe24be5c077646e0f0e4cdd57f936a48c2fdd016a131678ecad8717b5f3fbdd0808f977474e7f47452bf2fb68a46895419fccb7cab6e0f22bd075e9df59a7b968fce014994f5559bf81926e5489e25de990a297947b8035585c15f03f73c5125e7e784afc1c496474d79352e169d73c931b87e7cb3f86e8151c8193cfb9d041247ffe7a9b9e22ce339f06fed1cd9fbc4bd7548fddb2604c048af9c5f4da2a69be14ef30d08d98a4658a1edbf48c22398430811f2525bfea1dde994ef6021079f77177719992990e9a64620883c7acf1556474abeddc6b85fa8779efa54d29bb11477f34818c0c88cd26244ae16cdcd61592e111307527
Frame ID: F938E14E4A94924233171BEEFF0CA259
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://west.treegadgetz.com/rd71d7vd77d7fd7gd79d7vd7wd7cd7xd7hd75d7cd7dd7ed78d71d76d72d7dd77d77d71d71d7
HTTP 302
https://vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/55781325bbc94985441grapjm9cs3?s=def50200e81dc66b... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://west.treegadgetz.com/rd71d7vd77d7fd7gd79d7vd7wd7cd7xd7hd75d7cd7dd7ed78d71d76d72d7dd77d77d71d71d7
HTTP 302
https://vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/55781325bbc94985441grapjm9cs3?s=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 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
55781325bbc94985441grapjm9cs3
vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/ Redirect Chain
|
4 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js.js
vstroom.theworkpc.com/ |
35 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f.css
vstroom.theworkpc.com/ |
142 KB 142 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c.css
vstroom.theworkpc.com/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
j.js
vstroom.theworkpc.com/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chronlogo.svg
vstroom.theworkpc.com/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
left.svg
vstroom.theworkpc.com/ |
513 B 755 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
vstroom.theworkpc.com/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
55781325bbc94985441grapjm9cs3
vstroom.theworkpc.com/ypEEyioKbh8pw15ce322d3852b7/ |
2 B 227 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| _0x1a77 object| CryptoJS object| _0xf795 object| CryptoJSAesJson string| d object| _0xce9e function| $ function| jQuery object| _0x3f31 object| _0xf69a0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
vstroom.theworkpc.com
west.treegadgetz.com
199.195.248.170
205.185.208.52
2606:4700:30::681f:5376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