URL: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Submission: On August 20 via api from US

Summary

This website contacted 5 IPs in 2 countries across 4 domains to perform 7 HTTP transactions. The main IP is 52.20.150.97, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is o365.malware.team.emailquarantine.com.
This is the only time o365.malware.team.emailquarantine.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 52.20.150.97 14618 (AMAZON-AES)
1 52.216.160.67 16509 (AMAZON-02)
1 54.230.93.22 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
7 5
Domain Requested by
2 o365.malware.team.emailquarantine.com o365.malware.team.emailquarantine.com
1 ajax.googleapis.com o365.malware.team.emailquarantine.com
1 d2wy8f7a9ursnm.cloudfront.net o365.malware.team.emailquarantine.com
1 tslp.s3.amazonaws.com o365.malware.team.emailquarantine.com
7 4

This site contains no links.

Subject Issuer Validity Valid

1970-01-01 -
1970-01-01
a few seconds crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-07 -
2020-02-07
a year crt.sh

This page contains 1 frames:

Primary Page: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Frame ID: C4767A2C81ED73B210EAC9966E8D5A1B
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /ATS\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • script /\/bugsnag.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

7
Requests

14 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

5
IPs

2
Countries

88 kB
Transfer

149 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set f4110ea798
o365.malware.team.emailquarantine.com/
3 KB
2 KB
Document
General
Full URL
http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Protocol
HTTP/1.1
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
39f7ad5d3a51b1f57895cf99e6984e98eba40a9203412715d48d6786b30810b2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
o365.malware.team.emailquarantine.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Cache-Control
max-age=0, private, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=utf-8
Date
Tue, 20 Aug 2019 02:36:34 GMT
ETag
W/"115861f1ec1ba9ee8c5a5fcdb6d031dc"
Server
ThreatSim-Web-Server
Set-Cookie
EXFILGUID=f4110ea798; path=/ link_clicked_f4110ea798=1; path=/
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-Host-Info
lw-prd-us-i-0749509cc52ca1cdb ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Request-Id
ae0d2499-6e97-44ac-bc5c-108dcc6d3a12
X-Runtime
0.010253
X-XSS-Protection
1; mode=block
Content-Length
932
Connection
keep-alive
alt_pixel_click_f4110ea798.gif
o365.malware.team.emailquarantine.com/
0
652 B
Image
General
Full URL
http://o365.malware.team.emailquarantine.com:49152/alt_pixel_click_f4110ea798.gif?correlation_id=cf1c2c04-0a22-4a9a-b9d2-39d4017f37d8
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Protocol
HTTP/1.1
Security
, ,
Server
52.20.150.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-20-150-97.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-Runtime
0.004433
Date
Tue, 20 Aug 2019 02:36:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
ThreatSim-Web-Server
X-Host-Info
lw-prd-us-i-0b3a4b31146868132, ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Frame-Options
SAMEORIGIN
Content-Type
image/gif; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
20
X-XSS-Protection
1; mode=block
X-Request-Id
311a2301-c8b4-4af4-b5e8-d5706d37e356
plugin_detect.js
tslp.s3.amazonaws.com/detect/
49 KB
49 KB
Script
General
Full URL
https://tslp.s3.amazonaws.com/detect/plugin_detect.js?guid=f4110ea798&correlation_id=cf1c2c04-0a22-4a9a-b9d2-39d4017f37d8
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.160.67 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-1-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
4bab432979d731f8264bcd9d40422ca7dfcfcb0e0e703288db78bbfa555f853a

Request headers

Sec-Fetch-Mode
no-cors
Referer
http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 20 Aug 2019 02:36:41 GMT
Last-Modified
Wed, 15 Feb 2017 17:56:07 GMT
Server
AmazonS3
x-amz-request-id
DBBD35FB5CA472DF
ETag
"00a513f07603df01e3b99be00f370754"
Content-Type
text/javascript
x-amz-version-id
null
Accept-Ranges
bytes
Content-Length
50085
x-amz-id-2
CtL4nQ5/r6KuDt60wqs78o/pb4mvINgRVf2a4K8oNp8b673JSVQn2R42QUZ4WEN9oaeL84ciZxU=
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
http://d2wy8f7a9ursnm.cloudfront.net/bugsnag-2.min.js
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Protocol
HTTP/1.1
Security
, ,
Server
54.230.93.22 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-22.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
9ff538f72465724fc393ea1f3c03a17233c9b7e1d440d6f8a6d0b3a836c2a9cc

Request headers

Referer
http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 18 Aug 2019 00:52:26 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Wed, 10 Aug 2016 00:30:49 GMT
Server
AmazonS3
Age
179049
ETag
"6103bb5e4ec6141e19e1100caafc780c"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 9f37c8b999ae2d6018396fda48773445.cloudfront.net (CloudFront)
Cache-Control
public, max-age=604800
X-Amz-Cf-Pop
FRA2
Accept-Ranges
bytes
Content-Length
2962
X-Amz-Cf-Id
mmRmaSt0TSUKy6yYW_xde22lhQshlyU_2XS1aN6zkUY_HE1nn39Y-A==
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/
90 KB
33 KB
Script
General
Full URL
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
Protocol
HTTP/1.1
Security
, ,
Server
2a00:1450:4001:806::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
http://o365.malware.team.emailquarantine.com/f4110ea798?l=12
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 04:33:56 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 20 Dec 2016 18:17:03 GMT
Server
sffe
Age
6818558
Vary
Accept-Encoding
Content-Type
text/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000, stale-while-revalidate=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
33018
X-XSS-Protection
0
Expires
Mon, 01 Jun 2020 04:33:56 GMT
google-tracking.js
o365.malware.team.emailquarantine.com/assets/
0
0

all.js
o365.malware.team.emailquarantine.com/assets/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
o365.malware.team.emailquarantine.com
URL
http://o365.malware.team.emailquarantine.com/assets/google-tracking.js?g=f4110ea798
Domain
o365.malware.team.emailquarantine.com
URL
http://o365.malware.team.emailquarantine.com/assets/all.js?g=f4110ea798

Verdicts & Comments Add Verdict or Comment

20 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| PluginDetect object| detector boolean| do_not_detect_java boolean| do_not_detect_flash boolean| do_not_detect_pdf boolean| do_not_detect_quicktime boolean| do_not_detect_realplayer boolean| do_not_detect_silverlight boolean| do_not_detect_wmp object| Bugsnag function| $ function| jQuery object| plugin_detector boolean| console_debug string| guid boolean| test_mode string| tracking_id string| correlation_id string| redirect_url string| base_post_url

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block