dvd3.blob.core.windows.net Open in urlscan Pro
52.239.172.132  Malicious Activity! Public Scan

URL: https://dvd3.blob.core.windows.net/rwe/red.html?sp=r&st=2021-03-17T20:37:27Z&se=2021-03-28T03:37:27Z&spr=https&sv=2020-02-10&sr=b&s...
Submission: On March 17 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 52.239.172.132, located in Boydton, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is dvd3.blob.core.windows.net.
TLS certificate: Issued by Microsoft RSA TLS CA 01 on February 16th 2021. Valid for: a year.
This is the only time dvd3.blob.core.windows.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: OneDrive (Online)

Domain & IP information

IP Address AS Autonomous System
1 52.239.172.132 8075 (MICROSOFT...)
1 151.101.112.193 54113 (FASTLY)
2 2
Apex Domain
Subdomains
Transfer
1 imgur.com
i.imgur.com
371 KB
1 windows.net
dvd3.blob.core.windows.net
4 KB
2 2
Domain Requested by
1 i.imgur.com dvd3.blob.core.windows.net
1 dvd3.blob.core.windows.net
2 2

This site contains no links.

Subject Issuer Validity Valid
*.blob.core.windows.net
Microsoft RSA TLS CA 01
2021-02-16 -
2022-02-16
a year crt.sh
*.imgur.com
DigiCert SHA2 Secure Server CA
2020-01-15 -
2022-03-16
2 years crt.sh

This page contains 1 frames:

Primary Page: https://dvd3.blob.core.windows.net/rwe/red.html?sp=r&st=2021-03-17T20:37:27Z&se=2021-03-28T03:37:27Z&spr=https&sv=2020-02-10&sr=b&sig=kImbnIIeoOsp7ssnLySrCy4mzi4WjH7QZE%2BjC%2FshtDU%3D
Frame ID: 455F0B8AFE097B2565581ACB2F201348
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

374 kB
Transfer

373 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request red.html
dvd3.blob.core.windows.net/rwe/
3 KB
4 KB
Document
General
Full URL
https://dvd3.blob.core.windows.net/rwe/red.html?sp=r&st=2021-03-17T20:37:27Z&se=2021-03-28T03:37:27Z&spr=https&sv=2020-02-10&sr=b&sig=kImbnIIeoOsp7ssnLySrCy4mzi4WjH7QZE%2BjC%2FshtDU%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.172.132 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
d3e565968d5b22d0d4ef8903c7b4d4eb6a296ca9002984de8bfd50ec4fc04468

Request headers

Host
dvd3.blob.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Length
3067
Content-Type
text/html
Content-MD5
a8y6wJAPPvtZB9AjuDVDLQ==
Last-Modified
Wed, 17 Mar 2021 20:37:24 GMT
Accept-Ranges
bytes
ETag
"0x8D8E98478C1BF07"
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
2512a68e-001e-0040-6576-1bade7000000
x-ms-version
2020-02-10
x-ms-creation-time
Wed, 17 Mar 2021 20:37:24 GMT
x-ms-lease-status
unlocked
x-ms-lease-state
available
x-ms-blob-type
BlockBlob
x-ms-server-encrypted
true
Date
Wed, 17 Mar 2021 21:42:45 GMT
xlrG8zE.jpg
i.imgur.com/
370 KB
371 KB
Image
General
Full URL
https://i.imgur.com/xlrG8zE.jpg
Requested by
Host: dvd3.blob.core.windows.net
URL: https://dvd3.blob.core.windows.net/rwe/red.html?sp=r&st=2021-03-17T20:37:27Z&se=2021-03-28T03:37:27Z&spr=https&sv=2020-02-10&sr=b&sig=kImbnIIeoOsp7ssnLySrCy4mzi4WjH7QZE%2BjC%2FshtDU%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.193 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
35df7d382d9a4daa8bc7fed06cec2345dc82710bb1d564610b09828cc88f2c9f
Security Headers
Name Value
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff

Request headers

Referer
https://dvd3.blob.core.windows.net/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 17 Mar 2021 21:42:45 GMT
x-content-type-options
nosniff
age
2985456
x-cache
HIT, HIT
content-length
379071
x-served-by
cache-bwi5181-BWI, cache-hhn4047-HHN
last-modified
Thu, 07 Jan 2021 15:56:44 GMT
server
cat factory 1.0
x-timer
S1616017366.898106,VS0,VE2
etag
"e2dd9dadba0f6e20969c49151323165a"
strict-transport-security
max-age=300
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
x-cache-hits
1, 1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: OneDrive (Online)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated number| isNS function| mischandler function| mousehandler function| debugBase64

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

dvd3.blob.core.windows.net
i.imgur.com
151.101.112.193
52.239.172.132
35df7d382d9a4daa8bc7fed06cec2345dc82710bb1d564610b09828cc88f2c9f
d3e565968d5b22d0d4ef8903c7b4d4eb6a296ca9002984de8bfd50ec4fc04468