rxenlwwlsu.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Effective URL: https://rxenlwwlsu.web.app/
Submission: On January 24 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1D4 on December 2nd 2021. Valid for: 3 months.
This is the only time rxenlwwlsu.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.122 167.89.123.122 | 11377 (SENDGRID) (SENDGRID) | |
1 | 2606:4700:303... 2606:4700:3032::ac43:855a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
4 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
11 | 6 |
ASN11377 (SENDGRID, US)
PTR: o16789123x122.outbound-mail.sendgrid.net
u21360247.ct.sendgrid.net |
ASN13335 (CLOUDFLARENET, US)
zhvqcwwzys.mary-keen.workers.dev |
ASN13335 (CLOUDFLARENET, US)
maxcdn.bootstrapcdn.com | |
stackpath.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 680 stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2427 |
114 KB |
3 |
web.app
rxenlwwlsu.web.app |
46 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 227 |
14 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 293 |
30 KB |
1 |
workers.dev
zhvqcwwzys.mary-keen.workers.dev |
829 B |
1 |
sendgrid.net
1 redirects
u21360247.ct.sendgrid.net |
273 B |
11 | 6 |
Domain | Requested by | |
---|---|---|
3 | rxenlwwlsu.web.app |
zhvqcwwzys.mary-keen.workers.dev
rxenlwwlsu.web.app |
2 | stackpath.bootstrapcdn.com |
rxenlwwlsu.web.app
stackpath.bootstrapcdn.com |
2 | cdnjs.cloudflare.com |
rxenlwwlsu.web.app
|
2 | maxcdn.bootstrapcdn.com |
rxenlwwlsu.web.app
|
1 | ajax.googleapis.com |
rxenlwwlsu.web.app
|
1 | zhvqcwwzys.mary-keen.workers.dev | |
1 | u21360247.ct.sendgrid.net | 1 redirects |
11 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-10-10 - 2022-10-09 |
a year | crt.sh |
web.app GTS CA 1D4 |
2021-12-02 - 2022-03-02 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2021-12-27 - 2022-03-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rxenlwwlsu.web.app/
Frame ID: E7C7EDE2ECC7ACDAE4CE0B449C330388
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Outlook Web AppPage URL History Show full URLs
-
https://u21360247.ct.sendgrid.net/ls/click?upn=sgsSlonNdZHppMOQ-2F3ry5oJpW94KETytNtUNJpLab-2Bv20KEzTt0GeLoa0qF...
HTTP 302
https://zhvqcwwzys.mary-keen.workers.dev/ Page URL
- https://rxenlwwlsu.web.app/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u21360247.ct.sendgrid.net/ls/click?upn=sgsSlonNdZHppMOQ-2F3ry5oJpW94KETytNtUNJpLab-2Bv20KEzTt0GeLoa0qFB-2BaAO3aAaNty5h-2Bjvl7mzXU7UR4exf38mCKY050nf8lTgCL4-3DW0MI_PkGkKWUvDtY7NZjAA48slbDO0AyybPaygTw8f-2Bo-2Ba-2F3DY3KqQdrVTOh0nKURBtCN77HKWaTIZliqEfbZblW9cur5366C-2FQoKuX41b6s-2FVJyp5IV2pcHldErPOMDGXWyZoBs8b1dfbBovfrOTpZFku95jQhHma262YfIG3-2F1BAl68YR59fVahSTxdaqV-2FZw06zCmFDIAjPGOOhfh2JQKY6Q-3D-3D
HTTP 302
https://zhvqcwwzys.mary-keen.workers.dev/ Page URL
- https://rxenlwwlsu.web.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://u21360247.ct.sendgrid.net/ls/click?upn=sgsSlonNdZHppMOQ-2F3ry5oJpW94KETytNtUNJpLab-2Bv20KEzTt0GeLoa0qFB-2BaAO3aAaNty5h-2Bjvl7mzXU7UR4exf38mCKY050nf8lTgCL4-3DW0MI_PkGkKWUvDtY7NZjAA48slbDO0AyybPaygTw8f-2Bo-2Ba-2F3DY3KqQdrVTOh0nKURBtCN77HKWaTIZliqEfbZblW9cur5366C-2FQoKuX41b6s-2FVJyp5IV2pcHldErPOMDGXWyZoBs8b1dfbBovfrOTpZFku95jQhHma262YfIG3-2F1BAl68YR59fVahSTxdaqV-2FZw06zCmFDIAjPGOOhfh2JQKY6Q-3D-3D HTTP 302
- https://zhvqcwwzys.mary-keen.workers.dev/
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
zhvqcwwzys.mary-keen.workers.dev/ Redirect Chain
|
676 B 829 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
rxenlwwlsu.web.app/ |
41 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
rxenlwwlsu.web.app/js/ |
87 KB 27 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.min.js
rxenlwwlsu.web.app/js/ |
4 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
stackpath.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| mainLogonDiv boolean| showPlaceholderText string| mainLogonDivClassName function| setPlaceholderText function| showPasswordClick function| Popper number| g_fFcs0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
maxcdn.bootstrapcdn.com
rxenlwwlsu.web.app
stackpath.bootstrapcdn.com
u21360247.ct.sendgrid.net
zhvqcwwzys.mary-keen.workers.dev
167.89.123.122
2606:4700:3032::ac43:855a
2606:4700::6810:135e
2606:4700::6812:acf
2620:0:890::100
2a00:1450:4001:830::200a
02835066969199e9924f1332f7172a5d7e552f023a20c3d8ba03bb6c51ce5be5
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
36e0a7e08bee65774168528938072c536437669c1b7458ac77976ec788e4439c
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a
53964478a7c634e8dad34ecc303dd8048d00dce4993906de1bacf67f663486ef
6150a35c0f486c46cadf0e230e2aa159c7c23ecfbb5611b64ee3f25fcbff341f
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a
6bd745cac7dd2e979f9e89dcd3c1ed3058812be0c88a06fc066360f74120b717
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
bb204ce2331836c2dd5b0077118a8bc7afb82e6759a8d6dad65b85f73f82f76b
cbf7087a2988fdacf27759d55b69ea3808cd1fec12eae0fa9a9a212f0801fc98
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c
f9f0c6551759e4731ac22a54ee091795b8142f919b28c7e869b69531370d8fd9