60c2240f25b00933caf79898--onedrive-12.netlify.app
Open in
urlscan Pro
2a03:b0c0:3:d0::d24:2001
Malicious Activity!
Public Scan
Effective URL: https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/akocovflgloprqc/parid=root?scriptID=4709418594996413&cookies=MC41OTYzNDY4NTEyMjM0ODU3&to...
Submission: On June 18 via manual from US
Summary
TLS certificate: Issued by DigiCert TLS Hybrid ECC SHA384 2020 CA1 on March 9th 2021. Valid for: a year.
This is the only time 60c2240f25b00933caf79898--onedrive-12.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 2a03:b0c0:3:d... 2a03:b0c0:3:d0::d24:2001 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 35.169.173.194 35.169.173.194 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::200a | 15169 (GOOGLE) (GOOGLE) | |
6 | 185.143.233.120 185.143.233.120 | 202468 (ABRARVAN-...) (ABRARVAN-AS AbrArvan CDN and IaaS) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a00:1450:400... 2a00:1450:4001:809::2003 | 15169 (GOOGLE) (GOOGLE) | |
17 | 7 |
ASN14061 (DIGITALOCEAN-ASN, US)
60c2240f25b00933caf79898--onedrive-12.netlify.app |
ASN14618 (AMAZON-AES, US)
PTR: ec2-35-169-173-194.compute-1.amazonaws.com
loaddrirectjson.herokuapp.com |
ASN202468 (ABRARVAN-AS AbrArvan CDN and IaaS, IR)
jmtech.s3.ir-thr-at1.arvanstorage.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
arvanstorage.com
jmtech.s3.ir-thr-at1.arvanstorage.com |
107 KB |
4 |
netlify.app
1 redirects
60c2240f25b00933caf79898--onedrive-12.netlify.app |
8 KB |
3 |
gstatic.com
fonts.gstatic.com |
47 KB |
2 |
jquery.com
code.jquery.com |
61 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
herokuapp.com
loaddrirectjson.herokuapp.com |
229 B |
17 | 7 |
Domain | Requested by | |
---|---|---|
6 | jmtech.s3.ir-thr-at1.arvanstorage.com |
60c2240f25b00933caf79898--onedrive-12.netlify.app
jmtech.s3.ir-thr-at1.arvanstorage.com |
4 | 60c2240f25b00933caf79898--onedrive-12.netlify.app |
1 redirects
60c2240f25b00933caf79898--onedrive-12.netlify.app
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | code.jquery.com |
60c2240f25b00933caf79898--onedrive-12.netlify.app
|
1 | cdnjs.cloudflare.com |
60c2240f25b00933caf79898--onedrive-12.netlify.app
|
1 | fonts.googleapis.com |
60c2240f25b00933caf79898--onedrive-12.netlify.app
|
1 | loaddrirectjson.herokuapp.com |
code.jquery.com
|
17 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.netlify.app DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2021-03-09 - 2022-03-01 |
a year | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.herokuapp.com Amazon |
2021-05-29 - 2022-06-27 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-05-24 - 2021-08-16 |
3 months | crt.sh |
s3.ir-thr-at1.arvanstorage.com R3 |
2021-05-08 - 2021-08-06 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-05-24 - 2021-08-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/akocovflgloprqc/parid=root?scriptID=4709418594996413&cookies=MC41OTYzNDY4NTEyMjM0ODU3&token=9904072422917711&access=passed
Frame ID: 136E51DDA9797E5F0DDC0ECAE65210AF
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://60c2240f25b00933caf79898--onedrive-12.netlify.app/ Page URL
-
https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/AKOcovflGLOPrqc/parid=root.html?scriptID=4709418594996413&cookies=MC...
HTTP 301
https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/akocovflgloprqc/parid=root?scriptID=4709418594996413&cookies=MC41OTY... Page URL
Detected technologies
Netlify (Web Servers) ExpandDetected patterns
- headers server /^Netlify/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://60c2240f25b00933caf79898--onedrive-12.netlify.app/ Page URL
-
https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/AKOcovflGLOPrqc/parid=root.html?scriptID=4709418594996413&cookies=MC41OTYzNDY4NTEyMjM0ODU3&token=9904072422917711&access=passed
HTTP 301
https://60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/akocovflgloprqc/parid=root?scriptID=4709418594996413&cookies=MC41OTYzNDY4NTEyMjM0ODU3&token=9904072422917711&access=passed Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
60c2240f25b00933caf79898--onedrive-12.netlify.app/ |
1 KB 932 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
loaddrirectjson.herokuapp.com/ |
15 B 229 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
parid=root
60c2240f25b00933caf79898--onedrive-12.netlify.app/authkey/akocovflgloprqc/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
21 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
st.css
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Email.js
60c2240f25b00933caf79898--onedrive-12.netlify.app/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aStyle.css
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
37 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OneDrive_logo_and_wordmark.svg
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
10 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script_main.js
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
23 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b.jpg
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
47 KB 48 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v27/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
out.png
jmtech.s3.ir-thr-at1.arvanstorage.com/oneD/ |
39 KB 40 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v27/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v27/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)43 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| returnTheValue function| $ function| jQuery function| validateEmail function| submit_now function| getParameterByName function| urlcheck function| reading function| continue_function function| rearrangeParams function| YAFocus function| YAKeydown function| YAFocusout function| YASubmit function| changeToggle function| updateA function| updateY function| YAsubmit_form function| continue___function function| sendOutYA function| MOSubmit function| updateM function| sendOut function| MAsubmit_form function| continue__function string| api_name number| api_index function| LFocusOut function| LReload function| updateOUT function| OUTSubmit function| api0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
60c2240f25b00933caf79898--onedrive-12.netlify.app
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
jmtech.s3.ir-thr-at1.arvanstorage.com
loaddrirectjson.herokuapp.com
185.143.233.120
2001:4de0:ac18::1:a:3a
2606:4700::6810:135e
2a00:1450:4001:809::2003
2a00:1450:4001:827::200a
2a03:b0c0:3:d0::d24:2001
35.169.173.194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