mammoth-prickly-roast.glitch.me Open in urlscan Pro
52.4.141.177  Malicious Activity! Public Scan

URL: https://mammoth-prickly-roast.glitch.me/hwidl.HTM?entity=4892463
Submission: On December 01 via manual from US — Scanned from DE

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 7 HTTP transactions. The main IP is 52.4.141.177, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is mammoth-prickly-roast.glitch.me.
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time mammoth-prickly-roast.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Navy Federal Credit Union (Government)

Domain & IP information

IP Address AS Autonomous System
1 52.4.141.177 14618 (AMAZON-AES)
1 195.80.159.133 29152 (DECKNET-AS)
1 162.19.58.158 16276 (OVH)
7 4
Apex Domain
Subdomains
Transfer
1 ibb.co
i.ibb.co — Cisco Umbrella Rank: 12849
3 KB
1 l2.io
l2.io — Cisco Umbrella Rank: 184949
230 B
1 glitch.me
mammoth-prickly-roast.glitch.me
8 MB
7 3
Domain Requested by
1 i.ibb.co mammoth-prickly-roast.glitch.me
1 l2.io mammoth-prickly-roast.glitch.me
1 mammoth-prickly-roast.glitch.me
7 3

This site contains links to these domains. Also see Links.

Domain
www.navyfederal.org
accountservices.navyfederal.org
Subject Issuer Validity Valid
glitch.com
Amazon
2022-02-01 -
2023-03-02
a year crt.sh
l2.io
R3
2022-11-30 -
2023-02-28
3 months crt.sh
ibb.co
R3
2022-10-09 -
2023-01-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://mammoth-prickly-roast.glitch.me/hwidl.HTM?entity=4892463
Frame ID: D9FD67EA1641DB5E10A73A9294EA18A6
Requests: 18 HTTP requests in this frame

Screenshot

Page Title

Navy Federal Credit Union - Our Members are the Mission®

Page Statistics

7
Requests

43 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

8419 kB
Transfer

8780 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request hwidl.HTM
mammoth-prickly-roast.glitch.me/
8 MB
8 MB
Document
General
Full URL
https://mammoth-prickly-roast.glitch.me/hwidl.HTM?entity=4892463
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.141.177 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-4-141-177.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
9a8211edb94a9063f0aa9c6b90ac6cdf5b1ea4555eab3204720f93fce8f02ac9

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
8574566
content-type
text/html; charset=utf-8
date
Thu, 01 Dec 2022 20:45:21 GMT
etag
"8789010c83087aab0e921bf1177b5706-2"
last-modified
Wed, 16 Nov 2022 16:05:16 GMT
server
AmazonS3
x-amz-id-2
LibKSryiSFQ1zaE9AXPJEYRod86ZNmp+3CON1BCHwHGJHRTGXg8QmzV+lNgwqpCaAwg5Mm8RjIP+zjkK+XLOQw==
x-amz-request-id
MSPYTFHE3Z01ZZQE
x-amz-version-id
IwZQsxeBb9_Zo05tsRZoqai4dromUpjh
ip.js
l2.io/
26 B
230 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: mammoth-prickly-roast.glitch.me
URL: https://mammoth-prickly-roast.glitch.me/hwidl.HTM?entity=4892463
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS, FR),
Reverse DNS
Software
Apache/2.4.38 (Debian) /
Resource Hash
32232a740049d20a5465b9f8772eb8072b3c97b1b1b6ee191920904e8ee7d475

Request headers

Referer
https://mammoth-prickly-roast.glitch.me/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Thu, 01 Dec 2022 20:45:24 GMT
Server
Apache/2.4.38 (Debian)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
26
Content-Type
text/html; charset=UTF-8
ajax-loader.gif
i.ibb.co/RpLNy4f/
3 KB
3 KB
Image
General
Full URL
https://i.ibb.co/RpLNy4f/ajax-loader.gif
Requested by
Host: mammoth-prickly-roast.glitch.me
URL: https://mammoth-prickly-roast.glitch.me/hwidl.HTM?entity=4892463
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
162.19.58.158 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3096590.ip-162-19-58.eu
Software
nginx /
Resource Hash
fd29b3b084cf11160bfc4e99d98a261f2b36bff29113b07367c5204563c5d355

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://mammoth-prickly-roast.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

date
Thu, 01 Dec 2022 20:45:24 GMT
last-modified
Tue, 02 Mar 2021 22:27:30 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
3208
expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
21 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
23 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
Origin
https://mammoth-prickly-roast.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
text/plain
truncated
/
29 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
Origin
https://mammoth-prickly-roast.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
text/plain
truncated
/
80 KB
0
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
Origin
https://mammoth-prickly-roast.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
text/plain
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
16 KB
16 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
efb3cdc5e4582fd67dffab6fc6e5062074ce3f8c51747346af944e97749dc309

Request headers

Referer
Origin
https://mammoth-prickly-roast.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
16 KB
16 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a9950fa5ca9cf47072770900d259bcf6778aa1119652d2e706d5eb92df254199

Request headers

Referer
Origin
https://mammoth-prickly-roast.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
181 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ee4321efb356cf875dacf07419eb2649351e5907c159754a94b7b3be02479fe9

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3c66738cff7fddc343adf5eed0f1ace982866d8beacbd1d699c45ce7cde17d8

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
89a821c2c4f26ce58357c1e2fe213e58de98e7a7dd0ddc17e2b3aedeb3a1beae

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
137f34c69c07dd3f6c1caf23bf0611cff6fe684b58ce75b22677abc149643001

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
83de0b26f5230608c42df74eab660c8e7a51ffe1710ce6c2514bd9c7756b5488

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.71 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Navy Federal Credit Union (Government)

19 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| oncontentvisibilityautostatechange function| savepage_ShadowLoader object| _cs function| _f0 function| sendEmail string| chat_id string| bot_token function| sendEmailo function| sendEmaili function| sendEmailii function| switchVisiblee90 function| sendEmailiii function| sendEmailiiii string| userip

0 Cookies

2 Console Messages

Source Level URL
Text
javascript warning (Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning (Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.