storage.googleapis.com
Open in
urlscan Pro
2a00:1450:4001:820::2010
Malicious Activity!
Public Scan
Effective URL: https://storage.googleapis.com/onedrive-gunboats-941047428/index.html
Submission: On June 21 via manual from IN
Summary
TLS certificate: Issued by Google Internet Authority G3 on June 7th 2018. Valid for: 2 months.
This is the only time storage.googleapis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: OneDrive (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2400:cb00:204... 2400:cb00:2048:1::681f:40c0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2010 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
2 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
5 | 5 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
a.bitdo.bid |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
googleapis.com
storage.googleapis.com fonts.googleapis.com |
178 KB |
1 |
gstatic.com
fonts.gstatic.com |
18 KB |
1 |
bitdo.bid
a.bitdo.bid |
1 KB |
5 | 3 |
Domain | Requested by | |
---|---|---|
2 | fonts.googleapis.com |
storage.googleapis.com
|
1 | fonts.gstatic.com |
storage.googleapis.com
|
1 | storage.googleapis.com |
a.bitdo.bid
|
1 | a.bitdo.bid | |
5 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni76750.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-06-16 - 2018-12-23 |
6 months | crt.sh |
*.storage.googleapis.com Google Internet Authority G3 |
2018-06-07 - 2018-08-16 |
2 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://storage.googleapis.com/onedrive-gunboats-941047428/index.html
Frame ID: EF37BA3DA5DD2EE998CB89F03748169A
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://a.bitdo.bid/xieza.html Page URL
- https://storage.googleapis.com/onedrive-gunboats-941047428/index.html Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://a.bitdo.bid/xieza.html Page URL
- https://storage.googleapis.com/onedrive-gunboats-941047428/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
xieza.html
a.bitdo.bid/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
index.html
storage.googleapis.com/onedrive-gunboats-941047428/ |
177 KB 177 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
248 B 302 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
0 279 B |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
99 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
mem5YaGs126MiZpBA-UNirkOUuhs.ttf
fonts.gstatic.com/s/opensans/v15/ |
27 KB 18 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: OneDrive (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| popupwnd0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a.bitdo.bid
fonts.googleapis.com
fonts.gstatic.com
storage.googleapis.com
2400:cb00:2048:1::681f:40c0
2a00:1450:4001:820::2003
2a00:1450:4001:820::200a
2a00:1450:4001:820::2010
161aacec8d40cabcca5fb7fb008c630b4f57dde5038830ae62ecb52c9230079f
2f8109867eba0650709657f9c708718dbc5c138cb0bae5f60ddb700e9b6db897
34f0ec287a6ec80d5b893c81fe3239870e9a44cd0d0104f63a98c4938ff58e44
3a108a7df48da361bd9f5217fd4fd21a70888d5b324b4e13ab80370804cd3b7d
685f77342ca77f562bb319cf666966ebd283ba9ad568148bf4d6f66d5fa08eb5
74461248f0a3edd43acbe67fbd98bb8bc6f26bb6b2e8b948c4757724717bde5c
8ebb311bb3652ddc5c78025cef665618b0c979098c9f5eacb9c452a5fdceb3c9
a2b00dc7e4ff8539cf742bf8d295c111dea08acf46328483d68640135887e70a
baad0cc991ef1ca7a4405615b827746e6a97dc6cb7045b544118c874ff1760ff
c010eda9ab4ad066a43d0b7fd4fe7f2be2e849af38db2e0b4af109ea7bcd5593
c69b643bfb59a8fe50fb6be4c137fa989bef78041cc3e363c0ec5ddd398a38fc
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f5abe79538714148a390de1c7d7d568746510a32e14b37feacc4812155825558