oxidized-insidious-diagnostic.glitch.me Open in urlscan Pro
34.231.193.208  Malicious Activity! Public Scan

URL: https://oxidized-insidious-diagnostic.glitch.me/
Submission: On April 16 via automatic, source openphish

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 34.231.193.208, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is oxidized-insidious-diagnostic.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time oxidized-insidious-diagnostic.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 34.231.193.208 14618 (AMAZON-AES)
1 188.241.39.10 25369 (BANDWIDTH-AS)
2 3
Apex Domain
Subdomains
Transfer
1 smtpyago2020.com
smtpyago2020.com
722 B
1 glitch.me
oxidized-insidious-diagnostic.glitch.me
400 KB
2 2
Domain Requested by
1 smtpyago2020.com oxidized-insidious-diagnostic.glitch.me
1 oxidized-insidious-diagnostic.glitch.me
2 2

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh
smtpyago2020.com
cPanel, Inc. Certification Authority
2021-04-02 -
2021-07-01
3 months crt.sh

This page contains 1 frames:

Primary Page: https://oxidized-insidious-diagnostic.glitch.me/
Frame ID: A52DF2AC7BECDBC364C5034750D2DA26
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

Office 365 Login | Microsoft Office

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

401 kB
Transfer

417 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
oxidized-insidious-diagnostic.glitch.me/
399 KB
400 KB
Document
General
Full URL
https://oxidized-insidious-diagnostic.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.193.208 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-231-193-208.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
5b1cc3e689b781b03c3e76e5df963d141464744fa2ffc7761a154586177c5a11

Request headers

:method
GET
:authority
oxidized-insidious-diagnostic.glitch.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 16 Apr 2021 01:34:08 GMT
content-type
text/html; charset=utf-8
content-length
408681
x-amz-id-2
3Jvw7Z9wUIc5Rjky0PiaTAGf8vE97LG4MywOi5+OovV3VeSFsZGuRzBS1PkrTd0UcX25LKVRFCc=
x-amz-request-id
Q9PKRMMBQMPC9FRN
last-modified
Fri, 16 Apr 2021 01:02:59 GMT
etag
"698a051583ef7a1551bb75a49c9b414f"
cache-control
no-cache
x-amz-version-id
fhPvBm6q_BbWDVELfVs92Itu0SGm.AD3
accept-ranges
bytes
server
AmazonS3
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
756 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
899 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
222 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
513 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
915 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a39b1946b7e6064c5c7594067ada4d9785fba941756b0be27eab6b76d9682c55

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg
call.php
smtpyago2020.com/work/0365/40/
579 B
722 B
XHR
General
Full URL
https://smtpyago2020.com/work/0365/40/call.php?u=null
Requested by
Host: oxidized-insidious-diagnostic.glitch.me
URL: https://oxidized-insidious-diagnostic.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
188.241.39.10 London, United Kingdom, ASN25369 (BANDWIDTH-AS, GB),
Reverse DNS
cphost09.qhoster.net
Software
LiteSpeed / PHP/7.3.19
Resource Hash
784f30bfb5ac228f7259e8549479a699c83b911d0118fb11b3866591eb1911c4

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://oxidized-insidious-diagnostic.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

access-control-allow-origin
*
date
Fri, 16 Apr 2021 01:34:11 GMT
server
LiteSpeed
x-powered-by
PHP/7.3.19
alt-svc
quic=":443"; ma=2592000; v="35,39,43,44"
content-length
579
content-type
application/json

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

21 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash

0 Cookies

1 Console Messages

Source Level URL
Text
console-api log URL: https://oxidized-insidious-diagnostic.glitch.me/(Line 10712)
Message:
PARAM CAME===>> null