URL: https://leakedfiles.org/archive/Malware/Botnet%20files/Exploits/vacron.py
Submission: On July 04 via manual from IL

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2400:cb00:2048:1::681b:9151, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is leakedfiles.org.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on June 27th 2018. Valid for: 6 months.
This is the only time leakedfiles.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 1
Apex Domain
Subdomains
Transfer
1 leakedfiles.org
leakedfiles.org
1 KB
1 1
Domain Requested by
1 leakedfiles.org
1 1

This site contains no links.

Subject Issuer Validity Valid
sni179591.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-06-27 -
2019-01-03
6 months crt.sh

This page contains 1 frames:

Primary Page: https://leakedfiles.org/archive/Malware/Botnet%20files/Exploits/vacron.py
Frame ID: 4ABA99C302FD234B35CB659689943DE9
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request vacron.py
leakedfiles.org/archive/Malware/Botnet%20files/Exploits/
976 B
1 KB
Document
General
Full URL
https://leakedfiles.org/archive/Malware/Botnet%20files/Exploits/vacron.py
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::681b:9151 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bc458eeb54ddb4db05b7fbd6f3323616783c84d59c23e60af4da14df3d210c6

Request headers

:method
GET
:authority
leakedfiles.org
:scheme
https
:path
/archive/Malware/Botnet%20files/Exploits/vacron.py
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
4ABA99C302FD234B35CB659689943DE9

Response headers

status
200
date
Wed, 04 Jul 2018 11:20:15 GMT
content-length
976
set-cookie
__cfduid=d0e6320bc8c22d8e59474fff43d7759311530703215; expires=Thu, 04-Jul-19 11:20:15 GMT; path=/; domain=.leakedfiles.org; HttpOnly
last-modified
Tue, 20 Mar 2018 13:52:26 GMT
accept-ranges
bytes
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4351339b6e1ebeee-FRA

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
.leakedfiles.org/ Name: __cfduid
Value: d0e6320bc8c22d8e59474fff43d7759311530703215

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

leakedfiles.org
2400:cb00:2048:1::681b:9151
7bc458eeb54ddb4db05b7fbd6f3323616783c84d59c23e60af4da14df3d210c6