URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Submission: On August 19 via api from US

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 7 HTTP transactions. The main IP is 52.3.193.16, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is o365.malware.team.emailquarantine.com.
This is the only time o365.malware.team.emailquarantine.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
4 52.3.193.16 14618 (AMAZON-AES)
1 52.217.0.43 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
7 4
Domain Requested by
4 o365.malware.team.emailquarantine.com o365.malware.team.emailquarantine.com
1 ajax.googleapis.com o365.malware.team.emailquarantine.com
1 tslp.s3.amazonaws.com o365.malware.team.emailquarantine.com
0 d2wy8f7a9ursnm.cloudfront.net Failed o365.malware.team.emailquarantine.com
7 4

This site contains no links.

Subject Issuer Validity Valid

1970-01-01 -
1970-01-01
a few seconds crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-07 -
2020-02-07
a year crt.sh

This page contains 1 frames:

Primary Page: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Frame ID: AD47A7573CB2882057ABD0B2B3451C7B
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /ATS\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • script /\/bugsnag.*\.js/i

Page Statistics

7
Requests

14 %
HTTPS

33 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

92 kB
Transfer

171 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set e80a204ec9
o365.malware.team.emailquarantine.com/
3 KB
2 KB
Document
General
Full URL
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Server
52.3.193.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-193-16.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
713deca84fb4969cfec1e61dd3dd194c5e52f49368327fdaf694114f8f751c0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
o365.malware.team.emailquarantine.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Cache-Control
max-age=0, private, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=utf-8
Date
Mon, 19 Aug 2019 13:36:31 GMT
ETag
W/"c894e4877675eb40d861a3d25e00a3a4"
Server
ThreatSim-Web-Server
Set-Cookie
EXFILGUID=e80a204ec9; path=/ link_clicked_e80a204ec9=1; path=/
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-Host-Info
lw-prd-us-i-0749509cc52ca1cdb ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Request-Id
9c6bf173-8efe-434e-aa46-26330e25aadd
X-Runtime
0.010002
X-XSS-Protection
1; mode=block
Content-Length
933
Connection
keep-alive
alt_pixel_click_e80a204ec9.gif
o365.malware.team.emailquarantine.com/
0
652 B
Image
General
Full URL
http://o365.malware.team.emailquarantine.com:49152/alt_pixel_click_e80a204ec9.gif?correlation_id=062d4e18-c285-4193-b3ad-d3d97e55d139
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.3.193.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-193-16.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

X-Runtime
0.004779
Date
Mon, 19 Aug 2019 13:36:33 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
ThreatSim-Web-Server
X-Host-Info
lw-prd-us-i-0d9d20c494d8ba273, ; 1c3a1fe29e724b6e1ffec322233f55b23384d071
X-Frame-Options
SAMEORIGIN
Content-Type
image/gif; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
20
X-XSS-Protection
1; mode=block
X-Request-Id
7dd8cc55-4355-4bd2-8d05-98aa9d3a7b70
plugin_detect.js
tslp.s3.amazonaws.com/detect/
49 KB
49 KB
Script
General
Full URL
https://tslp.s3.amazonaws.com/detect/plugin_detect.js?guid=e80a204ec9&correlation_id=062d4e18-c285-4193-b3ad-d3d97e55d139
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.217.0.43 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-1-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
4bab432979d731f8264bcd9d40422ca7dfcfcb0e0e703288db78bbfa555f853a

Request headers

Sec-Fetch-Mode
no-cors
Referer
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 19 Aug 2019 13:36:40 GMT
Last-Modified
Wed, 15 Feb 2017 17:56:07 GMT
Server
AmazonS3
x-amz-request-id
1320B906EFBAF4A6
ETag
"00a513f07603df01e3b99be00f370754"
Content-Type
text/javascript
x-amz-version-id
null
Accept-Ranges
bytes
Content-Length
50085
x-amz-id-2
gTmRWzEV1smzc8EcnJNtZOVR1rvslgaTAm3TjyuSV2fFkVNXOdJmW/wGDS8PVdVy3oEND8ox3Y0=
bugsnag-2.min.js
d2wy8f7a9ursnm.cloudfront.net/
0
0

jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/
90 KB
33 KB
Script
General
Full URL
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 02 Jun 2019 04:33:56 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 20 Dec 2016 18:17:03 GMT
Server
sffe
Age
6771756
Vary
Accept-Encoding
Content-Type
text/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000, stale-while-revalidate=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
33018
X-XSS-Protection
0
Expires
Mon, 01 Jun 2020 04:33:56 GMT
google-tracking.js
o365.malware.team.emailquarantine.com/assets/
455 B
707 B
Script
General
Full URL
http://o365.malware.team.emailquarantine.com/assets/google-tracking.js?g=e80a204ec9
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.3.193.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-193-16.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
fce517e48a56b76d45fd456264b90c82aa6e9ddb578f9f36d844ace5816d9841

Request headers

Referer
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 19 Aug 2019 13:36:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 18 Jul 2019 23:16:27 GMT
Server
ThreatSim-Web-Server
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Content-Length
316
Expires
Thu, 31 Dec 2037 23:55:55 GMT
all.js
o365.malware.team.emailquarantine.com/assets/
28 KB
8 KB
Script
General
Full URL
http://o365.malware.team.emailquarantine.com/assets/all.js?g=e80a204ec9
Requested by
Host: o365.malware.team.emailquarantine.com
URL: http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
Protocol
HTTP/1.1
Security
, ,
Server
52.3.193.16 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-193-16.compute-1.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
ef774b5afad3123585320f1a3a50431495853e3fc1aab3a2f707a7856ea59f4d

Request headers

Referer
http://o365.malware.team.emailquarantine.com/e80a204ec9?l=12&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 19 Aug 2019 13:36:33 GMT
Content-Encoding
gzip
Last-Modified
Thu, 18 Jul 2019 23:16:27 GMT
Server
ThreatSim-Web-Server
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
keep-alive
Content-Length
7339
Expires
Thu, 31 Dec 2037 23:55:55 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d2wy8f7a9ursnm.cloudfront.net
URL
http://d2wy8f7a9ursnm.cloudfront.net/bugsnag-2.min.js

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| PluginDetect object| detector boolean| do_not_detect_java boolean| do_not_detect_flash boolean| do_not_detect_pdf boolean| do_not_detect_quicktime boolean| do_not_detect_realplayer boolean| do_not_detect_silverlight boolean| do_not_detect_wmp

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block