URL: https://capture.condenastdigital.com/track?_ts=2020-02-07T17%3A55%3A16.054Z&_t=timespent&cBr=Wired&cKe=ransomware&cCh=security&cSch=c...
Submission: On February 07 via manual from IN

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 34.238.91.39, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is capture.condenastdigital.com.
TLS certificate: Issued by Amazon on April 26th 2019. Valid for: a year.
This is the only time capture.condenastdigital.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 34.238.91.39 14618 (AMAZON-AES)
1 1
Apex Domain
Subdomains
Transfer
1 condenastdigital.com
capture.condenastdigital.com
205 B
1 1
Domain Requested by
1 capture.condenastdigital.com
1 1

This site contains no links.

Subject Issuer Validity Valid
condenast.com
Amazon
2019-04-26 -
2020-05-26
a year crt.sh

This page contains 1 frames:

Primary Page: https://capture.condenastdigital.com/track?_ts=2020-02-07T17%3A55%3A16.054Z&_t=timespent&cBr=Wired&cKe=ransomware&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Meet%20LockerGoga%2C%20the%20Ransomware%20Crippling%20Industrial%20Firms&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451&cEnt=lockergoga%2C%20ransomware%2C%20malware%2C%20joe%20slowik%2C%20charles%20carmakal%2C%20fireeye%2C%20norsk%20hydro%2C%20momentive%2C%20aluminum%2C%20hexion%2C%20cybersecurity%2C%20dragos%2C%20altran%2C%20paralysis%2C%20norwegian%2C%20motherboard%2C%20malwarehunterteam%2C%20german%2C%20wire%2C%20mimikatz&cEnw=1%2C%200.9941389871686742%2C%200.7207377363621504%2C%200.7174945028896843%2C%200.6550731680827614%2C%200.6543657333920843%2C%200.6280995575684748%2C%200.6205662299986259%2C%200.6021196033411924%2C%200.5188344548789943%2C%200.5151971984127308%2C%200.4835116074077051%2C%200.4554073963070311%2C%200.45480028305658%2C%200.4528751330500963%2C%200.451314102010666%2C%200.43119405499311303%2C%200.42114291536504417%2C%200.4008001552370948%2C%200.39415064630912966&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5c98e131f14e4c4f224ef796&cPd=2019-03-25T18%3A26%3A20.639Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms&pRt=search&pRs=google&pHp=%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms%2F&pRr=https%3A%2F%2Fwww.google.com%2F&pSy=1600&pWw=1900&pWh=1000&pPw=1900&pPh=8000&pSw=1920&pSh=1080&uID=5f8c7763-32ef-4c72-ae58-575c3bb660e3&sID=10caea0a-4333-4d61-b75f-fed52519ae61&pID=6ec35c57-8494-42b1-b07c-ed4745bd5dd5&uDt=desktop&aam_uuid=09775951188080926481647325754461967866&_o=wired&_c=general&xID=524bf180-8cd0-4461-8ac3-7415af3e7bab&_v=6000&environment=prod&origin=wired&cKh=lockergoga%2Cransomware%2Cdisruption%2Cvictim%2Cresearcher%2Csystem%2Cmalware%2Cjoe%20slowik%2Ctarget%2Cindustrial%20firm%2Cpassword%2Ccharles%20carmakal%2Cfireeye%2Ccomputer%2Cnorsk%20hydro%2Chacker%2Cmomentive%2Cransom%2Caluminum
Frame ID: 12CC55CAB91C1DE1DB81042A0237E104
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request track
capture.condenastdigital.com/
48 B
205 B
Document
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-02-07T17%3A55%3A16.054Z&_t=timespent&cBr=Wired&cKe=ransomware&cCh=security&cSch=cyberattacks%20and%20hacks&cTi=Meet%20LockerGoga%2C%20the%20Ransomware%20Crippling%20Industrial%20Firms&cTy=article&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451%2C%200.5587927765668451&cEnt=lockergoga%2C%20ransomware%2C%20malware%2C%20joe%20slowik%2C%20charles%20carmakal%2C%20fireeye%2C%20norsk%20hydro%2C%20momentive%2C%20aluminum%2C%20hexion%2C%20cybersecurity%2C%20dragos%2C%20altran%2C%20paralysis%2C%20norwegian%2C%20motherboard%2C%20malwarehunterteam%2C%20german%2C%20wire%2C%20mimikatz&cEnw=1%2C%200.9941389871686742%2C%200.7207377363621504%2C%200.7174945028896843%2C%200.6550731680827614%2C%200.6543657333920843%2C%200.6280995575684748%2C%200.6205662299986259%2C%200.6021196033411924%2C%200.5188344548789943%2C%200.5151971984127308%2C%200.4835116074077051%2C%200.4554073963070311%2C%200.45480028305658%2C%200.4528751330500963%2C%200.451314102010666%2C%200.43119405499311303%2C%200.42114291536504417%2C%200.4008001552370948%2C%200.39415064630912966&cCu=https%3A%2F%2Fwww.wired.com%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms%2F&org_id=4gKgcErvvpkwWft3fSWg7c2niGQB&org_app_id=5QYt5Xy87uNBXaR4Wj3U2pPoRCBTTVrMHp8wN1h4BcXHZVYmf6sxzCnLQC&cCl=2&cId=5c98e131f14e4c4f224ef796&cPd=2019-03-25T18%3A26%3A20.639Z&ccS=web&cPv=all&cAu=Andy%20Greenberg&pHr=https%3A%2F%2Fwww.wired.com%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms&pRt=search&pRs=google&pHp=%2Fstory%2Flockergoga-ransomware-crippling-industrial-firms%2F&pRr=https%3A%2F%2Fwww.google.com%2F&pSy=1600&pWw=1900&pWh=1000&pPw=1900&pPh=8000&pSw=1920&pSh=1080&uID=5f8c7763-32ef-4c72-ae58-575c3bb660e3&sID=10caea0a-4333-4d61-b75f-fed52519ae61&pID=6ec35c57-8494-42b1-b07c-ed4745bd5dd5&uDt=desktop&aam_uuid=09775951188080926481647325754461967866&_o=wired&_c=general&xID=524bf180-8cd0-4461-8ac3-7415af3e7bab&_v=6000&environment=prod&origin=wired&cKh=lockergoga%2Cransomware%2Cdisruption%2Cvictim%2Cresearcher%2Csystem%2Cmalware%2Cjoe%20slowik%2Ctarget%2Cindustrial%20firm%2Cpassword%2Ccharles%20carmakal%2Cfireeye%2Ccomputer%2Cnorsk%20hydro%2Chacker%2Cmomentive%2Cransom%2Caluminum
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.238.91.39 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-238-91-39.compute-1.amazonaws.com
Software
/
Resource Hash
4f8f48b18463dd38185b16deee997adf27f88ed4036bea70afa90a9ce8dad648

Request headers

Host
capture.condenastdigital.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/gif
Date
Fri, 07 Feb 2020 19:03:20 GMT
Content-Length
48
Connection
keep-alive

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

capture.condenastdigital.com
34.238.91.39
4f8f48b18463dd38185b16deee997adf27f88ed4036bea70afa90a9ce8dad648