docsignature.ml
Open in
urlscan Pro
159.140.213.100
Malicious Activity!
Public Scan
Submission Tags: falconsandbox
Submission: On June 23 via api from US
Summary
This is the only time docsignature.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DocuSign (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 159.140.213.100 159.140.213.100 | 36502 (CERNER-CO...) (CERNER-CORPORATE-AS) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 185.81.101.38 185.81.101.38 | 62856 (DOCUS-6-PROD) (DOCUS-6-PROD) | |
3 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
docusign.com
account.docusign.com |
4 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
1 |
docsignature.ml
docsignature.ml |
2 KB |
3 | 3 |
Domain | Requested by | |
---|---|---|
1 | account.docusign.com |
docsignature.ml
|
1 | ajax.googleapis.com |
docsignature.ml
|
1 | docsignature.ml | |
3 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
account.docusign.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-03-26 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://docsignature.ml/?rid=S498bfE
Frame ID: AC5C7F78B891632AF29D8D11FF12F86B
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
docsignature.ml/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
docusign_logo_small.png
account.docusign.com/LoginAppNext/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DocuSign (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
account.docusign.com
ajax.googleapis.com
docsignature.ml
159.140.213.100
185.81.101.38
2a00:1450:4001:830::200a
33834301283fb75ad50f47e5991646ff88ddece2528e6c32ed143bd4226b3f5c
540bc6dec1dd4b92ea4d3fb903f69eabf6d919afd48f4e312b163c28cff0f441
e83f8d0b4a78d14185abfca96ee2fbaf18e396a047f725d944ff27a845787279