Submitted URL: https://wp.me/paA0Gi-BM
Effective URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Submission: On August 13 via api from US

Summary

This website contacted 8 IPs in 3 countries across 8 domains to perform 31 HTTP transactions. The main IP is 185.201.10.87, located in United States and belongs to AS-HOSTINGER, LT. The main domain is 0ffset.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on July 1st 2019. Valid for: 3 months.
This is the only time 0ffset.net was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 192.0.78.25 2635 (AUTOMATTIC)
1 9 185.201.10.87 47583 (AS-HOSTINGER)
1 2a00:1450:400... 15169 (GOOGLE)
1 54.230.95.180 16509 (AMAZON-02)
1 52.85.184.123 16509 (AMAZON-02)
1 192.0.77.32 2635 (AUTOMATTIC)
1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 192.0.76.3 2635 (AUTOMATTIC)
31 8
Domain Requested by
9 0ffset.net 1 redirects 0ffset.net
1 stats.wp.com 0ffset.net
1 secure.gravatar.com 0ffset.net
1 s0.wp.com 0ffset.net
1 z-na.amazon-adsystem.com 0ffset.net
1 downloads.mailchimp.com 0ffset.net
1 pagead2.googlesyndication.com 0ffset.net
1 wp.me 1 redirects
0 use.fontawesome.com Failed 0ffset.net
0 c0.wp.com Failed 0ffset.net
31 10

This site contains no links.

Subject Issuer Validity Valid
0ffset.net
Let's Encrypt Authority X3
2019-07-01 -
2019-09-29
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-07-29 -
2019-10-21
3 months crt.sh
downloads.mailchimp.com
Amazon
2019-07-24 -
2020-08-24
a year crt.sh
z-na.amazon-adsystem.com
Amazon
2019-06-12 -
2020-06-07
a year crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh

This page contains 1 frames:

Primary Page: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Frame ID: F45A6BAB62F16F0E71984F5AD47E4312
Requests: 31 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://wp.me/paA0Gi-BM HTTP 301
    https://0ffset.net/?p=2342 HTTP 301
    https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Page Statistics

31
Requests

45 %
HTTPS

25 %
IPv6

8
Domains

10
Subdomains

8
IPs

3
Countries

182 kB
Transfer

657 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://wp.me/paA0Gi-BM HTTP 301
    https://0ffset.net/?p=2342 HTTP 301
    https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

31 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Redirect Chain
  • https://wp.me/paA0Gi-BM
  • https://0ffset.net/?p=2342
  • https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
76 KB
23 KB
Document
General
Full URL
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed / PHP/7.0.33
Resource Hash
ca4b0d3d055c964de2731c5c24e0399f30889f6bf8772b8574b6d0bec4f0b850

Request headers

:method
GET
:authority
0ffset.net
:scheme
https
:path
/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-mode
navigate
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

status
200
x-powered-by
PHP/7.0.33
content-type
text/html; charset=UTF-8
x-pingback
https://0ffset.net/xmlrpc.php
link
<https://0ffset.net/wp-json/>; rel="https://api.w.org/" <https://wp.me/paA0Gi-BM>; rel=shortlink
content-encoding
br
vary
Accept-Encoding
date
Tue, 13 Aug 2019 14:49:33 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000

Redirect headers

status
301
x-powered-by
PHP/7.0.33
content-type
text/html; charset=UTF-8
x-pingback
https://0ffset.net/xmlrpc.php
x-redirect-by
WordPress
location
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
content-length
7
content-encoding
br
vary
Accept-Encoding
date
Tue, 13 Aug 2019 14:49:30 GMT
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
style.min.css
c0.wp.com/c/5.2.2/wp-includes/css/dist/block-library/
0
0

theme.min.css
c0.wp.com/c/5.2.2/wp-includes/css/dist/block-library/
0
0

foundation.min.css
0ffset.net/wp-content/themes/ubik/assets/css/
86 KB
12 KB
Stylesheet
General
Full URL
https://0ffset.net/wp-content/themes/ubik/assets/css/foundation.min.css?ver=5.2.2
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
ca297c838630b521184321c48f6fcab1fdebdd6cfd46c83352e920ebb8a2ffb4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
br
last-modified
Mon, 28 Jan 2019 19:02:25 GMT
server
LiteSpeed
etag
"158c2-5c4f51c1-f2a414fb8d5159d1;br"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
12126
expires
Tue, 20 Aug 2019 14:49:33 GMT
style.min.css
0ffset.net/wp-content/themes/ubik/assets/css/
41 KB
7 KB
Stylesheet
General
Full URL
https://0ffset.net/wp-content/themes/ubik/assets/css/style.min.css?ver=1.0.7
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
cd41474879208e1d39b3f82ef878c22717b68238ac3b4b4adbf48d671deaa896

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
br
last-modified
Mon, 28 Jan 2019 19:02:25 GMT
server
LiteSpeed
etag
"a2c4-5c4f51c1-11d5e1f7534c2366;br"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
6944
expires
Tue, 20 Aug 2019 14:49:33 GMT
kirki-styles.css
0ffset.net/wp-content/themes/ubik/inc/customizer/kirki/assets/css/
0
83 B
Stylesheet
General
Full URL
https://0ffset.net/wp-content/themes/ubik/inc/customizer/kirki/assets/css/kirki-styles.css?ver=3.0.33
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
last-modified
Mon, 28 Jan 2019 19:02:29 GMT
server
LiteSpeed
etag
"0-5c4f51c5-42fd4573ed1b8f8c;;;"
content-type
text/css
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
0
expires
Tue, 20 Aug 2019 14:49:33 GMT
social-logos.min.css
c0.wp.com/p/jetpack/7.6/_inc/social-logos/
0
0

jetpack.css
c0.wp.com/p/jetpack/7.6/css/
0
0

jquery.js
c0.wp.com/c/5.2.2/wp-includes/js/jquery/
0
0

jquery-migrate.min.js
c0.wp.com/c/5.2.2/wp-includes/js/jquery/
0
0

related-posts.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/related-posts/
0
0

all.js
use.fontawesome.com/releases/v5.0.13/js/
0
0

adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
93 KB
35 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
f42a5638b326002362bf4a208495f03e4e92306fcd0b37bec3646eb596c92b03
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43,39",quic=":443"; ma=2592000; v="46,43,39"
content-length
34890
x-xss-protection
0
server
cafe
etag
9530754936670608756
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Tue, 13 Aug 2019 14:49:33 GMT
embed.js
downloads.mailchimp.com/js/signup-forms/popup/unique-methods/
128 KB
46 KB
Script
General
Full URL
https://downloads.mailchimp.com/js/signup-forms/popup/unique-methods/embed.js
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.180 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-180.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
70c580d5c7439e70c79832c5dd4746b103c3e3189d6ffc5d9c1e946702f9cd40

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 13 Aug 2019 14:49:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 13 Jun 2019 14:50:59 GMT
Server
AmazonS3
X-Amz-Cf-Pop
FRA2
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 3aa04125cfbe212eb3783a1b1caebdb5.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
fSv7mk4w_dn1qGgLSu4xUHfCWdvtZHNhzMXgaS7c24yUX9JhVD0LlA==
wp-emoji-release.min.js
0ffset.net/wp-includes/js/
14 KB
4 KB
Script
General
Full URL
https://0ffset.net/wp-includes/js/wp-emoji-release.min.js?ver=5.2.2
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
f4799ef2939b8377cf33f07b07b6d90a4a245adbf1c6eaf47ee3b0fcefcc07fe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
br
last-modified
Tue, 21 May 2019 07:54:45 GMT
server
LiteSpeed
etag
"3610-5ce3aec5-af4022d03e2b5329;br"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
4256
expires
Tue, 20 Aug 2019 14:49:33 GMT
onejs
z-na.amazon-adsystem.com/widgets/
22 KB
8 KB
Script
General
Full URL
https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US&adInstanceId=4d645d38-ab18-43b7-84ef-2835845f8064
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.184.123 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-184-123.fra2.r.cloudfront.net
Software
Server /
Resource Hash
9ce666b199a774165f176523f3da973bf725283d150e2f7c300a1015244e058f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:40 GMT
content-encoding
gzip
x-amz-cf-pop
FRA2
x-cache
Miss from cloudfront
status
200
cneonction
close
content-length
7336
pragma
Public
access-control-allow-origin
*
server
Server
content-type
application/javascript;charset=UTF-8
via
1.1 143574384d395dec5e078f9c0bab3391.cloudfront.net (CloudFront)
charset
UTF-8
cache-control
public,max-age=300,s-maxage=300,no-transform
x-amz-cf-id
W6c_D2i_Bca9abdFagOn3PPzRSejUqtVFZ3gXUV6ekKvyo_2mioZ9g==
expires
Tue, 13 Aug 2019 14:54:40 GMT
photon.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/photon/
0
0

devicepx-jetpack.js
s0.wp.com/wp-content/js/
10 KB
3 KB
Script
General
Full URL
https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=201933
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f32d41f2099a0be20e6b57c5e0d1b71c079d3e1345827b0f5c5b97c6e5e3f78d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT ams 1
date
Tue, 13 Aug 2019 14:49:36 GMT
content-encoding
gzip
server
nginx
etag
W/"5841a56f-52b6"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
3.ams _dfw
expires
Sat, 04 Apr 2020 06:56:00 GMT
gprofiles.js
secure.gravatar.com/js/
20 KB
7 KB
Script
General
Full URL
https://secure.gravatar.com/js/gprofiles.js?ver=2019Augaa
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
9c42615b9f87888a452f177c5ea19899fb8a835b8f6d0b458824e6c332a0adce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
gzip
last-modified
Thu, 23 Aug 2018 15:01:14 GMT
server
nginx
etag
W/"5b7ecc3a-50bc"
content-type
application/x-javascript
status
200
cache-control
max-age=604800
expires
Tue, 20 Aug 2019 14:49:33 GMT
wpgroho.js
c0.wp.com/p/jetpack/7.6/modules/
0
0

comment-reply.min.js
c0.wp.com/c/5.2.2/wp-includes/js/
0
0

foundation.min.js
0ffset.net/wp-content/themes/ubik/assets/js/
145 KB
30 KB
Script
General
Full URL
https://0ffset.net/wp-content/themes/ubik/assets/js/foundation.min.js?ver=6.4.2
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
f6fff327333c07c4c9cedd568665b743dec36a3603eb2ac3413e31234a81ecb3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
br
last-modified
Mon, 28 Jan 2019 19:02:25 GMT
server
LiteSpeed
etag
"2454f-5c4f51c1-81c33235068a3d7c;br"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
30197
expires
Tue, 20 Aug 2019 14:49:33 GMT
all.min.js
0ffset.net/wp-content/themes/ubik/assets/js/
299 B
362 B
Script
General
Full URL
https://0ffset.net/wp-content/themes/ubik/assets/js/all.min.js?ver=1.0.7
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
011761b9ddfd9f0068b4c33f0b8050fca7a4b4027fb68c51b785e20148654c9c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
last-modified
Mon, 28 Jan 2019 19:02:25 GMT
server
LiteSpeed
etag
"12b-5c4f51c1-77089f3d563a1d94;;;"
content-type
application/x-javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
299
expires
Tue, 20 Aug 2019 14:49:33 GMT
lazy-images.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/lazy-images/js/
0
0

wp-embed.min.js
c0.wp.com/c/5.2.2/wp-includes/js/
0
0

webfontloader.js
0ffset.net/wp-content/themes/ubik/inc/customizer/kirki/modules/webfont-loader/vendor-typekit/
12 KB
5 KB
Script
General
Full URL
https://0ffset.net/wp-content/themes/ubik/inc/customizer/kirki/modules/webfont-loader/vendor-typekit/webfontloader.js?ver=3.0.28
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.201.10.87 , United States, ASN47583 (AS-HOSTINGER, LT),
Reverse DNS
Software
LiteSpeed /
Resource Hash
e0ee294b5487df566aad23b603fd902535634cfa957be8e7620396515afb1047

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:33 GMT
content-encoding
br
last-modified
Mon, 28 Jan 2019 19:02:29 GMT
server
LiteSpeed
etag
"30d9-5c4f51c5-3c68bd3e5e1f9442;br"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="39,43,46", h3-20=":443"; ma=2592000
content-length
4764
expires
Tue, 20 Aug 2019 14:49:33 GMT
spin.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/
0
0

jquery.spin.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/
0
0

jetpack-carousel.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/carousel/
0
0

sharing.min.js
c0.wp.com/p/jetpack/7.6/_inc/build/sharedaddy/
0
0

e-201933.js
stats.wp.com/
9 KB
3 KB
Script
General
Full URL
https://stats.wp.com/e-201933.js
Requested by
Host: 0ffset.net
URL: https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
0ebbc7fba9a50d36ef5422345f624431710db4528f25749d1d438c2c10bb69f2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://0ffset.net/reverse-engineering/malware-analysis/analyzing-turlas-keylogger-1/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 13 Aug 2019 14:49:34 GMT
content-encoding
gzip
server
nginx
etag
W/"5c6340e3-350a"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
expires
Sat, 04 Apr 2020 06:56:01 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/css/dist/block-library/style.min.css
Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/css/dist/block-library/theme.min.css
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/social-logos/social-logos.min.css
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/css/jetpack.css
Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/js/jquery/jquery.js
Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/js/jquery/jquery-migrate.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/related-posts/related-posts.min.js
Domain
use.fontawesome.com
URL
https://use.fontawesome.com/releases/v5.0.13/js/all.js?ver=1.0.7
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/photon/photon.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/modules/wpgroho.js
Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/js/comment-reply.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/lazy-images/js/lazy-images.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/c/5.2.2/wp-includes/js/wp-embed.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/spin.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/jquery.spin.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/carousel/jetpack-carousel.min.js
Domain
c0.wp.com
URL
https://c0.wp.com/p/jetpack/7.6/_inc/build/sharedaddy/sharing.min.js

Verdicts & Comments Add Verdict or Comment

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| _wpemojiSettings object| twemoji object| wp

0 Cookies