mulberry-fan-guavaberry.glitch.me
Open in
urlscan Pro
54.87.211.83
Malicious Activity!
Public Scan
Effective URL: https://mulberry-fan-guavaberry.glitch.me/
Submission: On April 05 via api from US — Scanned from US
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time mulberry-fan-guavaberry.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 99.86.229.104 99.86.229.104 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 54.87.211.83 54.87.211.83 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
3 | 172.67.221.5 172.67.221.5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: server-99-86-229-104.iad79.r.cloudfront.net
docsend.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-87-211-83.compute-1.amazonaws.com
mulberry-fan-guavaberry.glitch.me |
ASN13335 (CLOUDFLARENET, US)
yvewpdh.nokiatool.ru | |
ds.nokiatool.ru | |
bm7sail.nokiatool.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
nokiatool.ru
yvewpdh.nokiatool.ru ds.nokiatool.ru bm7sail.nokiatool.ru |
1 MB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 237 |
26 KB |
2 |
glitch.me
mulberry-fan-guavaberry.glitch.me |
5 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 759 |
30 KB |
1 |
docsend.com
1 redirects
docsend.com — Cisco Umbrella Rank: 95600 |
6 KB |
0 |
msftauth.net
Failed
aadcdn.msftauth.net Failed |
|
0 |
msauth.net
Failed
aadcdn.msauth.net Failed |
|
13 | 7 |
Domain | Requested by | |
---|---|---|
2 | cdnjs.cloudflare.com |
yvewpdh.nokiatool.ru
ds.nokiatool.ru |
2 | mulberry-fan-guavaberry.glitch.me | |
1 | bm7sail.nokiatool.ru |
code.jquery.com
|
1 | ds.nokiatool.ru |
yvewpdh.nokiatool.ru
|
1 | yvewpdh.nokiatool.ru |
code.jquery.com
|
1 | code.jquery.com |
mulberry-fan-guavaberry.glitch.me
|
1 | docsend.com | 1 redirects |
0 | aadcdn.msftauth.net Failed |
ds.nokiatool.ru
|
0 | aadcdn.msauth.net Failed |
ds.nokiatool.ru
|
13 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
nokiatool.ru GTS CA 1P5 |
2024-04-03 - 2024-07-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://mulberry-fan-guavaberry.glitch.me/
Frame ID: D05F1ADF074615533F34BCD425864B25
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://docsend.com/view/zmqdk83kxpwzqpv8
HTTP 302
https://mulberry-fan-guavaberry.glitch.me/ Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://docsend.com/view/zmqdk83kxpwzqpv8
HTTP 302
https://mulberry-fan-guavaberry.glitch.me/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
mulberry-fan-guavaberry.glitch.me/ Redirect Chain
|
589 B 952 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
yvewpdh.nokiatool.ru/ |
17 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
crypto-js.min.js
cdnjs.cloudflare.com/ajax/libs/crypto-js/4.2.0/ |
59 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
js.php
ds.nokiatool.ru/attachment/ |
18 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
/
bm7sail.nokiatool.ru/attachment/ |
2 MB 1 MB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
mulberry-fan-guavaberry.glitch.me/ |
4 KB 4 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
picker_verify_call_c2616792e1950f83fdef6e72dab97293.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
756 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
899 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_59892f1e05e3adf9fd2f71b42d92a27f.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg
- Domain
- aadcdn.msauth.net
- URL
- https://aadcdn.msauth.net/shared/1.0/content/images/picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg
- Domain
- aadcdn.msftauth.net
- URL
- https://aadcdn.msftauth.net/shared/1.0/content/images/picker_verify_call_c2616792e1950f83fdef6e72dab97293.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| b string| t string| u string| x function| loadScript function| a0_0x2121 function| a0_0x49e1 function| a0_0x14e4db function| _0x249e53 object| CryptoJS function| a0_0x287d string| caffeine string| ur function| a0_0x9caf function| Caffeine function| a0_0x124b0a object| script function| _0x4d6c913 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.docsend.com/ | Name: _v_ Value: pPEa%2FvwbJYboO7P%2BoZwnxhS0oVgRjqhI8nYbixRv4%2B%2FcT5WjS%2FBzu070U0XIj7HyMQbhUNUFEHuAkSy9wfXhYHUv%2FmtFjv%2F9PavrvmlTEZx7RaZ1Fg%3D%3D--UBv0DGdQm%2ByVu4PO--qE8OYl%2BHbrSMyGsrFZOazw%3D%3D |
|
.docsend.com/ | Name: _us_ Value: eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaEpJZzkyYVdWM1pXUWdaRzlqQmpvR1JWUT0iLCJleHAiOm51bGwsInB1ciI6ImNvb2tpZS5fdXNfIn19--0a19c6dc51d459746e8b01d901655a78795a6225 |
|
.docsend.com/ | Name: _dss_ Value: c4b8957f82ae91d602677782f0db2e65 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msftauth.net
bm7sail.nokiatool.ru
cdnjs.cloudflare.com
code.jquery.com
docsend.com
ds.nokiatool.ru
mulberry-fan-guavaberry.glitch.me
yvewpdh.nokiatool.ru
aadcdn.msauth.net
aadcdn.msftauth.net
104.17.24.14
172.67.221.5
2a04:4e42::649
54.87.211.83
99.86.229.104
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
6ae4feac7a6106e860322af5268b93a707c2e8fb12c5555ee82a65eb48cc095c
769a555de553babc35a3338f344dd7aa16260c93cea2c7db290707c90484e7cc
7c3d6552eadc3b8bb2b7c756577ef758f73d0eaba2c118e539a9913d6407f308
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
92e9716f7d3bcdf4915d5c0cef136b59c20f59e0b86649a20ed7cce4a56b1265
a441b68e7820da3c5bb0869979389a8e3fb2d8467b80a2f5df6ab81f3974a5b4
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2