chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com Open in urlscan Pro
173.249.1.171  Malicious Activity! Public Scan

URL: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Submission: On February 17 via automatic, source certstream-suspicious

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 5 HTTP transactions. The main IP is 173.249.1.171, located in Nuremberg, Germany and belongs to CONTABO, DE. The main domain is chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 17th 2020. Valid for: 3 months.
This is the only time chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WhatsApp (Instant Messenger)

Domain & IP information

IP Address AS Autonomous System
3 173.249.1.171 51167 (CONTABO)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
1 2 2a03:2880:f22... 32934 (FACEBOOK)
5 3
Domain Requested by
3 chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
1 www.whatsapp.com chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
1 www-cdn.whatsapp.net 1 redirects
1 www.wowkeren.com chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
5 4
Subject Issuer Validity Valid
samudra-cinta-sctv2020.ocry.com
Let's Encrypt Authority X3
2020-02-17 -
2020-05-17
3 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-11-07 -
2020-10-09
a year crt.sh
*.whatsapp.net
DigiCert SHA2 High Assurance Server CA
2020-01-19 -
2020-04-17
3 months crt.sh

This page contains 1 frames:

Primary Page: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Frame ID: A6A8E38C38DD4803D05CB710E340D4F7
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

100 %
HTTPS

67 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

268 kB
Transfer

268 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8 HTTP 302
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
7 KB
7 KB
Document
General
Full URL
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.249.1.171 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
vmi233594.contaboserver.net
Software
Apache /
Resource Hash
7168289b0169970ba94aa3d17db0ec26af84c28fc7bda423eeb23f01c1afa871

Request headers

Host
chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

Date
Mon, 17 Feb 2020 07:40:31 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.build35e635e635e6.css
chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/css/v4/
240 KB
241 KB
Stylesheet
General
Full URL
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/css/v4/style.build35e635e635e6.css
Requested by
Host: chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
URL: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.249.1.171 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
vmi233594.contaboserver.net
Software
Apache /
Resource Hash
5d6ebaa0e5f23c2aafea7f738be1a5c88019121c46f497fe8e6c7af7e5f0db4c

Request headers

Referer
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Mon, 17 Feb 2020 07:40:31 GMT
Last-Modified
Mon, 15 Apr 2019 14:53:12 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
246233
00286996.jpg
www.wowkeren.com/display/images/photo/2019/12/09/
0
0
Image
General
Full URL
https://www.wowkeren.com/display/images/photo/2019/12/09/00286996.jpg
Requested by
Host: chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
URL: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::681a:f65 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

whatsapp-logo.svg
www.whatsapp.com/img/v4/
Redirect Chain
  • https://www-cdn.whatsapp.net/img/v4/whatsapp-logo.svg?v=46fe27fc8
  • https://www.whatsapp.com/img/v4/whatsapp-logo.svg
0
0
Image
General
Full URL
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
Requested by
Host: chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
URL: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f22d:c5:face:b00c:0:167 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Redirect headers

date
Mon, 17 Feb 2020 07:40:31 GMT, Mon, 17 Feb 2020 07:40:31 GMT
x-fb-trip-id
1679558926
server
proxygen-bolt
location
https://www.whatsapp.com/img/v4/whatsapp-logo.svg
content-type
text/plain
status
302
alt-svc
h3-24=":443"; ma=3600
content-length
0
icon-chat.png
chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/img/v4/
20 KB
20 KB
Image
General
Full URL
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/img/v4/icon-chat.png
Requested by
Host: chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com
URL: https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.249.1.171 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
vmi233594.contaboserver.net
Software
Apache /
Resource Hash
b6b5990665e9b1e7db462f4f74c4d9517e1e6b315403cdc43150bd26084ea4c4

Request headers

Referer
https://chat.whatsapp.com.samudra-cinta-sctv2020.ocry.com/css/v4/style.build35e635e635e6.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Mon, 17 Feb 2020 07:40:31 GMT
Last-Modified
Mon, 15 Apr 2019 14:53:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
20384

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WhatsApp (Instant Messenger)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies