![](/screenshots/6a82107d-f092-4274-b42b-8d8406dc6dc6.png)
ltc5.blob.core.windows.net
Open in
urlscan Pro
52.239.169.132
Malicious Activity!
Public Scan
Effective URL: https://ltc5.blob.core.windows.net/cac/o77v.html?sp=r&st=2020-05-01T16:52:16Z&se=2020-06-06T00:52:16Z&spr=https&sv=2019-02-02&sr=b&...
Submission: On May 01 via manual from US
Summary
TLS certificate: Issued by Microsoft IT TLS CA 4 on April 19th 2020. Valid for: 2 years.
This is the only time ltc5.blob.core.windows.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 34.215.207.57 34.215.207.57 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 52.239.232.68 52.239.232.68 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 52.239.169.132 52.239.169.132 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
4 | 183.90.245.30 183.90.245.30 | 9371 (SAKURA-C ...) (SAKURA-C SAKURA Internet Inc.) | |
2 | 2620:1ec:bdf::10 2620:1ec:bdf::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2606:4700::68... 2606:4700::6810:85e5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 6 |
ASN16509 (AMAZON-02, US)
PTR: ec2-34-215-207-57.us-west-2.compute.amazonaws.com
verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
ohya.blob.core.windows.net |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
ltc5.blob.core.windows.net |
ASN9371 (SAKURA-C SAKURA Internet Inc., JP)
PTR: sv2029.xserver.jp
anzu-usa.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
anzu-usa.com
anzu-usa.com |
312 KB |
2 |
msauth.net
aadcdn.msauth.net |
2 KB |
2 |
windows.net
ohya.blob.core.windows.net ltc5.blob.core.windows.net |
21 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
30 KB |
1 |
adobe-campaign.com
1 redirects
verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com |
752 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
4 | anzu-usa.com |
ltc5.blob.core.windows.net
cdnjs.cloudflare.com |
2 | aadcdn.msauth.net |
ltc5.blob.core.windows.net
|
1 | cdnjs.cloudflare.com |
ltc5.blob.core.windows.net
|
1 | ltc5.blob.core.windows.net |
ohya.blob.core.windows.net
|
1 | ohya.blob.core.windows.net | |
1 | verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com | 1 redirects |
9 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft IT TLS CA 2 |
2020-02-09 - 2022-02-09 |
2 years | crt.sh |
www.anzu-usa.com Let's Encrypt Authority X3 |
2020-04-30 - 2020-07-29 |
3 months | crt.sh |
aadcdn.msauth.net Microsoft IT TLS CA 4 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
cloudflare.com CloudFlare Inc ECC CA-2 |
2020-01-07 - 2020-10-09 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ltc5.blob.core.windows.net/cac/o77v.html?sp=r&st=2020-05-01T16:52:16Z&se=2020-06-06T00:52:16Z&spr=https&sv=2019-02-02&sr=b&sig=ZNzzApqKLlv6ypBm88Ta6FEKyHUpyp8fp%2Fnk3WMxbFQ%3D
Frame ID: E219DE7D598A7A16CEF099AEE06C2044
Requests: 10 HTTP requests in this frame
Screenshot
![](/screenshots/6a82107d-f092-4274-b42b-8d8406dc6dc6.png)
Page URL History Show full URLs
-
http://verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com/r/?id=h1d3a8fe,25f7530,25f8443&CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=...
HTTP 302
https://ohya.blob.core.windows.net/cvb/AbV.html?CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=fc7917dd9666fc3913... Page URL
- https://ltc5.blob.core.windows.net/cac/o77v.html?sp=r&st=2020-05-01T16:52:16Z&se=2020-06-06T00:52:16Z&spr=https... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com/r/?id=h1d3a8fe,25f7530,25f8443&CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=fc7917dd9666fc3913694b0c90cd2e225a8c7f3c175bcc00e2271a89a8db4360&CUHID=b3a000962f166f301202f71f0293c8c15d588af0b1e849febc948ed81fb3d197&cvosrc=e.r.EMC_C_RVG_S_NON_WKLYACC_2018061_T0&p1=ohya.blob.core.windows.net/cvb/AbV.html
HTTP 302
https://ohya.blob.core.windows.net/cvb/AbV.html?CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=fc7917dd9666fc3913694b0c90cd2e225a8c7f3c175bcc00e2271a89a8db4360&CUHID=b3a000962f166f301202f71f0293c8c15d588af0b1e849febc948ed81fb3d197&cvosrc=e.r.EMC_C_RVG_S_NON_WKLYACC_2018061_T0 Page URL
- https://ltc5.blob.core.windows.net/cac/o77v.html?sp=r&st=2020-05-01T16:52:16Z&se=2020-06-06T00:52:16Z&spr=https&sv=2019-02-02&sr=b&sig=ZNzzApqKLlv6ypBm88Ta6FEKyHUpyp8fp%2Fnk3WMxbFQ%3D Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com/r/?id=h1d3a8fe,25f7530,25f8443&CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=fc7917dd9666fc3913694b0c90cd2e225a8c7f3c175bcc00e2271a89a8db4360&CUHID=b3a000962f166f301202f71f0293c8c15d588af0b1e849febc948ed81fb3d197&cvosrc=e.r.EMC_C_RVG_S_NON_WKLYACC_2018061_T0&p1=ohya.blob.core.windows.net/cvb/AbV.html HTTP 302
- https://ohya.blob.core.windows.net/cvb/AbV.html?CMP=EMC_C_RVG_S_NON_WKLYACC_2018061_T0&EMHID=fc7917dd9666fc3913694b0c90cd2e225a8c7f3c175bcc00e2271a89a8db4360&CUHID=b3a000962f166f301202f71f0293c8c15d588af0b1e849febc948ed81fb3d197&cvosrc=e.r.EMC_C_RVG_S_NON_WKLYACC_2018061_T0
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
AbV.html
ohya.blob.core.windows.net/cvb/ Redirect Chain
|
698 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
o77v.html
ltc5.blob.core.windows.net/cac/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
anzu-usa.com/common/css/web/mx/ |
99 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
anzu-usa.com/common/css/web/mx/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
aadcdn.msauth.net/ests/2.1/content/images/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msauth.net/ests/2.1/content/images/ |
513 B 573 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
anzu-usa.com/common/css/web/mx/ |
287 KB 287 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
valid_email.php
anzu-usa.com/common/css/web/etc/ |
138 B 286 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| isEmail0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
anzu-usa.com
cdnjs.cloudflare.com
ltc5.blob.core.windows.net
ohya.blob.core.windows.net
verizonwirelesspdi-mkt-prod1-t.adobe-campaign.com
183.90.245.30
2606:4700::6810:85e5
2620:1ec:bdf::10
34.215.207.57
52.239.169.132
52.239.232.68
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0638ce4fc84b3a8fbd19fe05f915b9c7336ed7102a8b940d3509cdef3629fa40
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
64c70e408858c3e3b07a412b58a59832400e8e21324cf9585907bd17cb82e21d
6ea72f8426d2fd527f9c70e6f0ba278b13182add31364b9e5e59ef2bbe1df166
80891615a5fe44b5601a0dee4a5c1f4ba36c26db48911f144252e1f42d672ddc
9e9386a003da879ebf29a9705aa1d94acc401c23fb8d63522d1e323606fa9f64
a76c08e9cdc3bb87bfb57627ad8f6b46f0e5ef826cc7f046dfbaf25d7b7958ea
ba1f7e7f63a74f50f9e76b5cb1e445545126fac7bd1cb6b6d7fb5ab51acf9f66