www.maliciousfile.download Open in urlscan Pro
54.154.53.202  Malicious Activity! Public Scan

URL: https://www.maliciousfile.download/
Submission Tags: falconsandbox
Submission: On June 23 via api from US

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 31 HTTP transactions. The main IP is 54.154.53.202, located in Dublin, Ireland and belongs to AMAZON-02, US. The main domain is www.maliciousfile.download.
TLS certificate: Issued by Amazon on April 16th 2021. Valid for: a year.
This is the only time www.maliciousfile.download was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishing Simulation (Internet)

Domain & IP information

IP Address AS Autonomous System
27 54.154.53.202 16509 (AMAZON-02)
1 151.101.114.110 54113 (FASTLY)
3 162.247.243.146 23467 (NEWRELIC-...)
31 3
Domain Requested by
27 www.maliciousfile.download www.maliciousfile.download
3 bam-cell.nr-data.net www.maliciousfile.download
1 js-agent.newrelic.com www.maliciousfile.download
31 3

This site contains no links.

Subject Issuer Validity Valid
shopingnow.store
Amazon
2021-04-16 -
2022-05-15
a year crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2021-05-21 -
2022-04-10
a year crt.sh
*.nr-data.net
DigiCert SHA2 Secure Server CA
2020-02-05 -
2022-02-08
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.maliciousfile.download/
Frame ID: 627B5AB1A930DE5B4EA26211790241A0
Requests: 31 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /ATS\/?([\d.]+)?/i

Page Statistics

31
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

85 kB
Transfer

200 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

31 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.maliciousfile.download/
30 KB
11 KB
Document
General
Full URL
https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
8b1d48c8285c15a75d7d9e8bf4dca77877afd6c4d3a67d666c0343d6d29b49a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.maliciousfile.download
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-type
text/html; charset=utf-8
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
x-content-type-options
nosniff
x-download-options
noopen
x-permitted-cross-domain-policies
none
referrer-policy
strict-origin-when-cross-origin
etag
W/"8b1d48c8285c15a75d7d9e8bf4dca778"
cache-control
max-age=0, private, must-revalidate
x-request-id
fb50d3c5-5fdf-45a1-af66-a6ecabd420f1
x-runtime
0.003070
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
server
ThreatSim-Web-Server
access-control-allow-origin
*
content-encoding
gzip
jquery.min.js
www.maliciousfile.download/assets/ajax/libs/jquery/1.11.0/
94 KB
33 KB
Script
General
Full URL
https://www.maliciousfile.download/assets/ajax/libs/jquery/1.11.0/jquery.min.js
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

:path
/assets/ajax/libs/jquery/1.11.0/jquery.min.js
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
last-modified
Thu, 27 May 2021 13:14:03 GMT
server
ThreatSim-Web-Server
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=315360000 public
expires
Thu, 31 Dec 2037 23:55:55 GMT
logo.png
www.maliciousfile.download/assets/
7 KB
6 KB
Image
General
Full URL
https://www.maliciousfile.download/assets/logo.png
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
26c0e365593f0e20033bd24f01e6e3e68af4e2bb7bec1fd79d795c92560162e9

Request headers

:path
/assets/logo.png
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
last-modified
Thu, 27 May 2021 13:14:07 GMT
server
ThreatSim-Web-Server
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000 public
expires
Thu, 31 Dec 2037 23:55:55 GMT
all.js
www.maliciousfile.download/assets/
28 KB
7 KB
Script
General
Full URL
https://www.maliciousfile.download/assets/all.js?g=infopage
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
39b4614f1c87cf0cfd1bc3375642e95825cb2018e0318a36aad766ddb5a8cbe9

Request headers

:path
/assets/all.js?g=infopage
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
last-modified
Thu, 27 May 2021 13:14:03 GMT
server
ThreatSim-Web-Server
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=315360000 public
content-length
7191
expires
Thu, 31 Dec 2037 23:55:55 GMT
browser_post
www.maliciousfile.download/secure/
0
610 B
XHR
General
Full URL
https://www.maliciousfile.download/secure/browser_post
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

sec-fetch-mode
cors
origin
https://www.maliciousfile.download
accept-encoding
gzip, deflate, br
tracestate
1506924@nr=0-1-98147-1307432040-f7cff7b4c4b38c17----1624429528362
accept-language
en-US
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6Ijk4MTQ3IiwiYXAiOiIxMzA3NDMyMDQwIiwiaWQiOiJmN2NmZjdiNGM0YjM4YzE3IiwidHIiOiI4NGUxYjllYmI3YzA2N2Q4MGFhYTNjMzViYjQ5OWZhMCIsInRpIjoxNjI0NDI5NTI4MzYyLCJ0ayI6IjE1MDY5MjQifX0=
sec-fetch-dest
empty
x-requested-with
XMLHttpRequest
content-length
635
:path
/secure/browser_post
pragma
no-cache
x-newrelic-id
XQ4GVVFACQAAU1VQDwQHUw==
traceparent
00-84e1b9ebb7c067d80aaa3c35bb499fa0-f7cff7b4c4b38c17-01
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
application/x-www-form-urlencoded; charset=UTF-8
accept
*/*
cache-control
no-cache
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
POST
X-NewRelic-ID
XQ4GVVFACQAAU1VQDwQHUw==
tracestate
1506924@nr=0-1-98147-1307432040-f7cff7b4c4b38c17----1624429528362
traceparent
00-84e1b9ebb7c067d80aaa3c35bb499fa0-f7cff7b4c4b38c17-01
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6Ijk4MTQ3IiwiYXAiOiIxMzA3NDMyMDQwIiwiaWQiOiJmN2NmZjdiNGM0YjM4YzE3IiwidHIiOiI4NGUxYjllYmI3YzA2N2Q4MGFhYTNjMzViYjQ5OWZhMCIsInRpIjoxNjI0NDI5NTI4MzYyLCJ0ayI6IjE1MDY5MjQifX0=
Content-Type
application/x-www-form-urlencoded; charset=UTF-8
Accept
*/*
Referer
https://www.maliciousfile.download/
X-Requested-With
XMLHttpRequest

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
none
x-xss-protection
1; mode=block
x-request-id
35ac071a-c228-4ec0-af9f-ae909d301ae5
x-runtime
0.004960
referrer-policy
strict-origin-when-cross-origin
x-newrelic-app-data
PxQOWVdXDxABV1FVAwMPU1QEFB9AJQwMRBBXDlRdRh1VDFcGVBNsEhZfWRVJAEpWURAEQBsBGVZIARgDUlNXVwBWAFUJCwIKB1UBUx1MAk5GD1NRUAUKBQNSUgBRAgUEVBMaVQMKEAdt
server
ThreatSim-Web-Server
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-frame-options
SAMEORIGIN
x-download-options
noopen
vary
Accept-Encoding
content-type
image/gif; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20localStorage%20%3D%20false&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20localStorage%20%3D%20false&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003357
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
daf893df-c276-4980-8d35-1c35d55a0821
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20sessionStorage%20%3D%20true&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20sessionStorage%20%3D%20true&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003464
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
e0ed6548-f239-4c72-90ec-b47dea356a2e
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20hasCookies%20%3D%20true&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20hasCookies%20%3D%20true&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003471
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0b762e6ecd99e2009 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
bb84dbca-fbc6-4bc8-a4b1-4e01b8b7a320
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
397 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20browser%20%3D%20Chrome&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20browser%20%3D%20Chrome&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003775
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
459483f0-b64f-4316-9d8a-988d01974057
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20browser_version%20%3D%2089&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20browser_version%20%3D%2089&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003415
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
525537b6-ee5d-4252-be01-fd18b34d9e2e
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20os%20%3D%20Linux&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20os%20%3D%20Linux&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003315
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
12d7db65-033e-472d-a806-cc70ea3ae1bf
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20os_version%20%3D%2010&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20os_version%20%3D%2010&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003303
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0b762e6ecd99e2009 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
2e50fe8e-6853-45f7-85f6-a87378cba1e3
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20language%20%3D%20en-US&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20language%20%3D%20en-US&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003054
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
2a9d9d83-f0fb-4c32-b2fe-2be4553aec02
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20colorDepth%20%3D%2024&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20colorDepth%20%3D%2024&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.005578
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
5de54366-657e-4b4e-bf77-70068a9b05e0
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20width%20%3D%201600&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20width%20%3D%201600&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.002572
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
820f20d0-6898-409d-867e-948134750980
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=BrowserDetect%20-%20height%20%3D%201200&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=BrowserDetect%20-%20height%20%3D%201200&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.002293
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0b762e6ecd99e2009 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
8f5a745c-6ab3-451a-bbcf-005739d7dcd0
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
log
www.maliciousfile.download/
0
475 B
Image
General
Full URL
https://www.maliciousfile.download/log?id=infopage&sev=1&msg=PluginDetect%20is%20not%20defined&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/log?id=infopage&sev=1&msg=PluginDetect%20is%20not%20defined&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
none
x-xss-protection
1; mode=block
x-request-id
e9fca771-7cd2-411f-b60f-1ab20087e2c6
x-runtime
0.005842
referrer-policy
strict-origin-when-cross-origin
server
ThreatSim-Web-Server
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-frame-options
SAMEORIGIN
x-download-options
noopen
vary
Accept-Encoding
content-type
image/gif; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Skipping%20java%20detection&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Skipping%20java%20detection&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.009406
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
5ca0837f-24b1-4db6-893c-94b882502521
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20flash%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20flash%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.002558
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
45256abc-a635-4551-9a34-c8785e9acd0f
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
log
www.maliciousfile.download/
0
476 B
Image
General
Full URL
https://www.maliciousfile.download/log?id=infopage&sev=1&msg=Cannot%20read%20property%20%27getVersion%27%20of%20undefined&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/log?id=infopage&sev=1&msg=Cannot%20read%20property%20%27getVersion%27%20of%20undefined&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 23 Jun 2021 06:25:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
none
x-xss-protection
1; mode=block
x-request-id
2e308405-574b-4b33-95e4-a96cb7e7cb42
x-runtime
0.002720
referrer-policy
strict-origin-when-cross-origin
server
ThreatSim-Web-Server
x-host-info
lw-prod-eu-i-0b762e6ecd99e2009 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-frame-options
SAMEORIGIN
x-download-options
noopen
vary
Accept-Encoding
content-type
image/gif; charset=utf-8
access-control-allow-origin
*
cache-control
no-cache
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20pdf%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20pdf%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.006992
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
7f6e90d9-8381-48f2-bf46-76211907e126
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20quicktime%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20quicktime%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.007791
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
7d2c7090-c622-432f-a6ef-cefdd6982fee
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
397 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20RealPlayer%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20RealPlayer%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003323
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
476b99f8-bd11-427d-894b-3e36c19c3465
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20Silverlight%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20Silverlight%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.001984
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0b762e6ecd99e2009 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
45ed2491-fec6-4646-b7f8-791148422ab0
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=Loading%20WindowsMediaPlayer%20version&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=Loading%20WindowsMediaPlayer%20version&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003728
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0ae444baec42ea86d ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
10a26e6b-3fdf-4b7f-9893-af4226ce13c5
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=redirect_url%20is%20undefined&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=redirect_url%20is%20undefined&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.003928
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-073a530c203186473 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
65a93b2c-f433-43c7-9c61-46a027a43c9f
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
trace
www.maliciousfile.download/
0
396 B
Image
General
Full URL
https://www.maliciousfile.download/trace?id=infopage&msg=browser_post_successful&correlation_id=undefined
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.53.202 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-154-53-202.eu-west-1.compute.amazonaws.com
Software
ThreatSim-Web-Server /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:path
/trace?id=infopage&msg=browser_post_successful&correlation_id=undefined
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
www.maliciousfile.download
referer
https://www.maliciousfile.download/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-runtime
0.002195
date
Wed, 23 Jun 2021 06:25:28 GMT
referrer-policy
strict-origin-when-cross-origin
x-permitted-cross-domain-policies
none
x-host-info
lw-prod-eu-i-0aadd795718af0706 ; e935b0781e7588b3d0111128df84633ce7c95cf9
x-download-options
noopen
x-frame-options
SAMEORIGIN
content-type
text/html
access-control-allow-origin
*
x-xss-protection
1; mode=block
cache-control
no-cache
x-request-id
cd8afcb8-9a37-43b9-9fe6-489c1ded4b69
content-length
0
x-content-type-options
nosniff
server
ThreatSim-Web-Server
nr-spa-1209.min.js
js-agent.newrelic.com/
42 KB
16 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1209.min.js
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.110 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
49cd7e514d20a427de78b14e516213d02b2c7ec0cee399584eab79f889c55964

Request headers

Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
d4wwExyN0N4Ag7LHjGXgHn7eRha876Bt
content-encoding
gzip
etag
"0a1d4ac0ed6107cdf844f28cc3ba3b82"
x-amz-request-id
DRZCW1FDBXXQCMK4
x-cache
HIT
content-length
15799
x-amz-id-2
G9cxviaS/lD4VfCzmwzLy9nrTn72HrW/sBAgjiKAtGaHmWd+Y8b9dCJND+lbs9ezgn3WGK9Ouqg=
x-served-by
cache-hhn4034-HHN
last-modified
Thu, 20 May 2021 23:21:19 GMT
server
AmazonS3
x-timer
S1624429529.636111,VS0,VE0
date
Wed, 23 Jun 2021 06:25:28 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
10088
4b7a74eb40
bam-cell.nr-data.net/1/
49 B
915 B
Script
General
Full URL
https://bam-cell.nr-data.net/1/4b7a74eb40?a=1307428505&v=1209.f04e2b9&to=dVtXQkUKCFpTQxtVBVhQUFhQSg1YUlRM&rst=746&ck=1&ref=https://www.maliciousfile.download/&ap=3&be=264&fe=563&dc=402&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1624429527949,%22n%22:0,%22f%22:1,%22dn%22:2,%22dne%22:21,%22c%22:21,%22s%22:50,%22ce%22:153,%22rq%22:153,%22rp%22:254,%22rpe%22:255,%22dl%22:257,%22di%22:402,%22ds%22:402,%22de%22:421,%22dc%22:563,%22l%22:563,%22le%22:564%7D,%22navigation%22:%7B%7D%7D&fp=400&fcp=400&jsonp=NREUM.setToken
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.146 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dac715f087720dd7ff7067f5d2ec1988851fa93140ae8a9cbfaa15659dd7fd82

Request headers

Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 23 Jun 2021 06:25:29 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
X-NewRelic-App-Data
PxQGQlRUAAoHUFRbFR0VMQFTYkEDCBADUxZRDVZkG3xWEU0YdQhAEgVCVAkDEWQcfgEVFk51XhUUUEJQCgMRQBxSFlIUChoHClAMV3RMB05WAhtDAAYAUgMFVFIEBQRRUFMGAUBKBQNcEV0/
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Transfer-Encoding
chunked
Connection
keep-alive
access-control-allow-credentials
true
CF-Ray
663ba3ab3e0f9d00-AMS
cf-request-id
0ad9249f0400009d00a5258000000001
4b7a74eb40
bam-cell.nr-data.net/events/1/
24 B
563 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/4b7a74eb40?a=1307428505&v=1209.f04e2b9&to=dVtXQkUKCFpTQxtVBVhQUFhQSg1YUlRM&rst=1386&ck=1&ref=https://www.maliciousfile.download/
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.146 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
text/plain

Response headers

Date
Wed, 23 Jun 2021 06:25:29 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.maliciousfile.download
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
663ba3ae8eb89d00-AMS
Content-Length
24
cf-request-id
0ad924a11500009d008c192000000001
4b7a74eb40
bam-cell.nr-data.net/events/1/
24 B
563 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/4b7a74eb40?a=1307428505&v=1209.f04e2b9&to=dVtXQkUKCFpTQxtVBVhQUFhQSg1YUlRM&rst=10746&ck=1&ref=https://www.maliciousfile.download/
Requested by
Host: www.maliciousfile.download
URL: https://www.maliciousfile.download/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.146 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.maliciousfile.download/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
text/plain

Response headers

Date
Wed, 23 Jun 2021 06:25:38 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.maliciousfile.download
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
663ba3e90f5d9d00-AMS
Content-Length
24
cf-request-id
0ad924c5a300009d00a6981000000001

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishing Simulation (Internet)

42 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| NREUM object| newrelic function| __nr_require boolean| do_not_detect_java string| tracking_id function| $ function| jQuery object| BrowserDetect object| $_GET undefined| regex undefined| items undefined| last string| base_post_url function| log_error function| log_to_console function| log_message boolean| fingerprinted function| strip function| secureSubmitWithGuid function| secureSubmit function| findUsername function| checkPassword function| secureLogAndRedirect function| sendFingerprint function| imageSender function| sendIndividually function| loadAllInfo object| local_addresses function| redirector function| rewriteLinks function| isFormValid

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block