URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Submission: On November 11 via manual from US

Summary

This website contacted 18 IPs in 5 countries across 16 domains to perform 45 HTTP transactions. The main IP is 13.225.73.94, located in Seattle, United States and belongs to AMAZON-02, US. The main domain is forums.malwarebytes.com.
TLS certificate: Issued by Amazon on September 17th 2020. Valid for: a year.
This is the only time forums.malwarebytes.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
22 content.invisioncic.com forums.malwarebytes.com
content.invisioncic.com
3 www.google-analytics.com forums.malwarebytes.com
www.google-analytics.com
3 forums.malwarebytes.com content.invisioncic.com
2 segments.company-target.com 1 redirects forums.malwarebytes.com
2 match.prod.bidr.io 2 redirects
2 px.ads.linkedin.com 1 redirects forums.malwarebytes.com
2 rum.uptime.com forums.malwarebytes.com
rum.uptime.com
2 script.crazyegg.com www.googletagmanager.com
script.crazyegg.com
2 snap.licdn.com www.googletagmanager.com
snap.licdn.com
1 api.company-target.com scripts.demandbase.com
1 scripts.demandbase.com forums.malwarebytes.com
1 www.malwarebytes.com www.googletagmanager.com
1 www.google.de forums.malwarebytes.com
1 www.google.com forums.malwarebytes.com
1 www.linkedin.com 1 redirects
1 stats.g.doubleclick.net www.google-analytics.com
1 fonts.gstatic.com fonts.googleapis.com
1 www.googletagmanager.com forums.malwarebytes.com
1 fonts.googleapis.com forums.malwarebytes.com
45 19
Subject Issuer Validity Valid
forums.malwarebytes.com
Amazon
2020-09-17 -
2021-10-19
a year crt.sh
upload.video.google.com
GTS CA 1O1
2020-10-28 -
2021-01-20
3 months crt.sh
content.invisioncic.com
Amazon
2020-09-16 -
2021-10-18
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2020-10-20 -
2021-01-12
3 months crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-06-09 -
2021-06-09
a year crt.sh
*.gstatic.com
GTS CA 1O1
2020-10-20 -
2021-01-12
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-10-20 -
2021-01-12
3 months crt.sh
uptime.com
Amazon
2020-02-13 -
2021-03-13
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2020-08-05 -
2021-02-05
6 months crt.sh
www.google.com
GTS CA 1O1
2020-10-20 -
2021-01-12
3 months crt.sh
www.google.de
GTS CA 1O1
2020-10-20 -
2021-01-12
3 months crt.sh
*.malwarebytes.com
DigiCert SHA2 High Assurance Server CA
2018-12-06 -
2020-12-09
2 years crt.sh
tag.demandbase.com
Go Daddy Secure Certificate Authority - G2
2020-10-14 -
2021-11-15
a year crt.sh
api.demandbase.com
Go Daddy Secure Certificate Authority - G2
2020-10-09 -
2021-10-28
a year crt.sh
*.company-target.com
Go Daddy Secure Certificate Authority - G2
2019-06-19 -
2021-08-18
2 years crt.sh

This page contains 1 frames:

Primary Page: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Frame ID: 945FDD1FE2B698EFBD5A6149C08CBD65
Requests: 47 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • html /googletagmanager\.com\/ns\.html[^>]+><\/iframe>/i
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

45
Requests

100 %
HTTPS

68 %
IPv6

16
Domains

19
Subdomains

18
IPs

5
Countries

657 kB
Transfer

2150 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 34
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D2594100%26time%3D1605125883460%26url%3Dhttps%253A%252F%252Fforums.malwarebytes.com%252Ftopic%252F245131-random-i_bongacash-javascript-injection%252F%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&liSync=true
Request Chain 42
  • https://match.prod.bidr.io/cookie-sync/demandbase HTTP 303
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1 HTTP 303
  • https://segments.company-target.com/log?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ HTTP 303
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ&verifyHash=13b3aa2956d11468fdf3c64af54fae1b05f8e66

45 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
177 KB
26 KB
Document
General
Full URL
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.225.73.94 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-73-94.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
b0ea0d64d469caa762582220ab54e60e75d32f807f174199051244b51ed4f99d
Security Headers
Name Value
X-Frame-Options sameorigin
X-Xss-Protection 0

Request headers

:method
GET
:authority
forums.malwarebytes.com
:scheme
https
:path
/topic/245131-random-i_bongacash-javascript-injection/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
25495
date
Wed, 11 Nov 2020 20:18:02 GMT
server
Apache
set-cookie
ips4_IPSSessionFront=v2p4qih1ajn4lu0ippplhh4nig; path=/; secure; HttpOnly ips4_guestTime=1605125882; path=/; secure; HttpOnly
expires
Wed, 11 Nov 2020 20:33:02 GMT
cache-control
max-age=900, public
pragma
no-cache
x-ips-loggedin
0
content-encoding
gzip
x-xss-protection
0
x-frame-options
sameorigin
x-ips-cached-response
Wed, 11 Nov 2020 20:16:47 GMT
last-modified
Wed, 11 Nov 2020 20:16:47 GMT
vary
cookie,Accept-Encoding
x-cache
Miss from cloudfront
via
1.1 e56e6732f380db727425bac2d6158761.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
2_FafXP8-zMGCkfs7gNDbiPMoobaEJ1RYJcLxI3O4dOw33DdF6f0nA==
css
fonts.googleapis.com/
8 KB
781 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Inter:300,300i,400,400i,500,700,700i
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
1163516775488cf1fd48ff94d90cdf91807668288c87c7018cf380e01668af06
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://forums.malwarebytes.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Wed, 11 Nov 2020 20:07:42 GMT
server
ESF
date
Wed, 11 Nov 2020 20:18:03 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 11 Nov 2020 20:18:03 GMT
341e4a57816af3ba440d891ca87450ff_framework.css.gz
content.invisioncic.com/Mmalware/css_built_26/
289 KB
54 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/341e4a57816af3ba440d891ca87450ff_framework.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
89973490736c0f03b42a2d3a6d6159e1a897e40c0127d95760867eaa990c9e59

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
54353
last-modified
Fri, 06 Nov 2020 22:37:05 GMT
server
AmazonS3
etag
"4e9170aac110a0b173ec3ba633190eb1"
x-amz-version-id
gChAY2uVZ.SHIQRpy2XaiNgVJLby9xsg
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
pGP-ggmbQtFlQHx_id7vEjqmturkvephlvvlCtYi84VDjiV9T5Ce7Q==
05e81b71abe4f22d6eb8d1a929494829_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_26/
35 KB
7 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/05e81b71abe4f22d6eb8d1a929494829_responsive.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
866c2a38455e522821a726e8e31dc49f0f80dc374872193a4fbfd72d9f968fe7

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
6650
last-modified
Fri, 06 Nov 2020 22:37:05 GMT
server
AmazonS3
etag
"3d798675aa898b53c8b5a075e384ad26"
x-amz-version-id
qE9yvk4iOYN26xV05J0P4OpWRK0FI44y
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
w6vvL4M_Q1dsDUYkBHPSTSrcPvGikeqTySzZTzlbpuiOqQxy8kT7RQ==
90eb5adf50a8c640f633d47fd7eb1778_core.css.gz
content.invisioncic.com/Mmalware/css_built_26/
19 KB
5 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/90eb5adf50a8c640f633d47fd7eb1778_core.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
208392c679aa35641114b1aeb27e6e44d41c82fe373d047784622de7b4f620d9

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
4632
last-modified
Fri, 06 Nov 2020 22:37:05 GMT
server
AmazonS3
etag
"3e73806e3deb9113fd5fe3ab9bfc1fa7"
x-amz-version-id
94E9rLykzL7OhqMjaVIRRDLLWzBMoZMo
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
piqf-nYNYBPFeFNCI5ZMhJvXh8MMeDOuM9Hq-YyjJefa8O8fqhj9IA==
5a0da001ccc2200dc5625c3f3934497d_core_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_26/
5 KB
2 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/5a0da001ccc2200dc5625c3f3934497d_core_responsive.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4e0f39543ae4c15cfe3222f68e358c416dc79cb262c16c8d5b46281a5d850f40

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
1204
last-modified
Fri, 06 Nov 2020 22:37:05 GMT
server
AmazonS3
etag
"5c3c523b949cbb61acd0828c69748124"
x-amz-version-id
J7Lpbv1WWhgY7jTH2LlnOWB1Bsv0FA3G
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
PsfsGGQpj96KIYEm6SR74b0NszRCB4auafOBzDv8jz3Ry6fqAxj5qg==
62e269ced0fdab7e30e026f1d30ae516_forums.css.gz
content.invisioncic.com/Mmalware/css_built_26/
17 KB
4 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/62e269ced0fdab7e30e026f1d30ae516_forums.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
349c48c1181990de28c97ff83f1bdb625ae379beaa775fc8f6f47a72017057fd

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
3972
last-modified
Fri, 06 Nov 2020 22:37:06 GMT
server
AmazonS3
etag
"f36bba24bf58ebe0624811b5c30ebb85"
x-amz-version-id
KzTY7Szl9FJrIJV31_cLmnmmBBNVryaz
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
iuSn5tjHiyvbRozJaklebpFil6dLyuBuH3ZNKucKGj3238j9ynhvcg==
76e62c573090645fb99a15a363d8620e_forums_responsive.css.gz
content.invisioncic.com/Mmalware/css_built_26/
7 KB
2 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/76e62c573090645fb99a15a363d8620e_forums_responsive.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44c618bb34d9cbba13bf68465b02308390d384f62f38f0c25b2acaf3244addcd

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
1454
last-modified
Fri, 06 Nov 2020 22:37:06 GMT
server
AmazonS3
etag
"efc77614f8920558a176c9c4641c0446"
x-amz-version-id
1B.YgkBjZR.x60kPJ0h4_PVi0wu57.r8
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
So91iuK2ydAXmTliq5HYHA19ggvxFxuuSIZcDDwSye3I3wpSxP9ssA==
ebdea0c6a7dab6d37900b9190d3ac77b_topics.css.gz
content.invisioncic.com/Mmalware/css_built_26/
3 KB
1 KB
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/ebdea0c6a7dab6d37900b9190d3ac77b_topics.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e7bbb9e4ad05f3991988e27bc1936a7a3e6edcf991f6e585af0516243502e781

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
930
last-modified
Fri, 06 Nov 2020 22:37:08 GMT
server
AmazonS3
etag
"d529d97b07c75c032d388fa82bdf018f"
x-amz-version-id
mP3g5Q_jw4Ua.cyCvxzuCiGyABjBIkkb
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
HENQSctDRgND_OZXXS7auVBrISo9DW2DL1Y06dIwr1xQx99Lwry4Zg==
258adbb6e4f3e83cd3b355f84e3fa002_custom.css.gz
content.invisioncic.com/Mmalware/css_built_26/
909 B
895 B
Stylesheet
General
Full URL
https://content.invisioncic.com/Mmalware/css_built_26/258adbb6e4f3e83cd3b355f84e3fa002_custom.css.gz?v=d815db93211604702223
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
57c3f04fbb9639231d4264b8274b69bbc380d63ffa8bac95a71a414c25a9db7e

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:42:04 GMT
content-encoding
gzip
age
423360
x-cache
Hit from cloudfront
status
200
content-length
480
last-modified
Fri, 06 Nov 2020 22:37:08 GMT
server
AmazonS3
etag
"5151cecbbee6837fb4f36bdcc421b216"
x-amz-version-id
IIrT9Z5i1BlA2qyrW7wPN_Dwkq9PDyPQ
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/css
x-amz-cf-id
pqGcXJPob3tmzRvSWZM0QcvPNuXIJHk7dRkSZxR4b8l0EZmLlwpLqA==
MWB4_FreeDownload_728x90_v1.jpg.b80b620cce83ef5649ae4740e701210c.jpg
content.invisioncic.com/Mmalware/monthly_2020_08/
16 KB
16 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_08/MWB4_FreeDownload_728x90_v1.jpg.b80b620cce83ef5649ae4740e701210c.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 25 Aug 2020 03:06:47 GMT
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
last-modified
Tue, 25 Aug 2020 00:38:45 GMT
server
AmazonS3
age
6801077
etag
"f0356d9351192b59bc7db4b160684b81"
x-cache
Hit from cloudfront
x-amz-version-id
gZw59MumHC3jdRWKPrDF1l.WFGbejRR2
status
200
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
image/jpeg
content-length
16292
x-amz-cf-id
lpwcI1yFBLgVbrebrk_kbldiawAzsl4dJyDf5xI18Dc9UiT3_r2ABg==
gtm.js
www.googletagmanager.com/
246 KB
63 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
94d1fdd565eca2f8ae9371da1c817dff600bc47a0b97faad8f30617d5557efe2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
content-encoding
br
vary
Accept-Encoding
status
200
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
64414
x-xss-protection
0
last-modified
Wed, 11 Nov 2020 18:22:43 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Wed, 11 Nov 2020 20:18:03 GMT
truncated
/
283 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eac6ebb9761f39a252e767afaac53c70da72da8bc38814782724bcc09117ca64

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
283 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
84925038dd75196a324b3a9935a6b11a0311ca9c0c594eda0bf8fc40e169e525

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/svg+xml
walle-small.thumb.jpg.2a2890326edaf652128ad60dbccec75c.jpg
content.invisioncic.com/Mmalware/monthly_2020_10/
3 KB
4 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_10/walle-small.thumb.jpg.2a2890326edaf652128ad60dbccec75c.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b128e2c2ec5d360ee5a571e34fb8afb5e7f3c9c0ac159132c8a2c23305a8295

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Tue, 03 Nov 2020 16:16:03 GMT
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
last-modified
Tue, 27 Oct 2020 09:22:52 GMT
server
AmazonS3
age
705721
etag
"8b3a32a77a3bd5b43efd9dc815a43fe7"
x-cache
Hit from cloudfront
x-amz-version-id
LW8.XTehWCpi4tuMrDOjvB9dGimrq9E3
status
200
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
image/jpeg
content-length
3447
x-amz-cf-id
U2c_F8JLVVM047VF0E-9632roGv3_E4NA83fjIopLEr8yxsjOwToYA==
455389808_MWBStaffLogoShort.png.471513c6a13f05393350352f7bc42e55.png
content.invisioncic.com/Mmalware/monthly_2020_11/
3 KB
3 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_11/455389808_MWBStaffLogoShort.png.471513c6a13f05393350352f7bc42e55.png
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
24c13cdea638620ec96bc3b7ba1bdef0cbe3ad0847b2ddc6f041df1fa24cffa4

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 06 Nov 2020 22:31:21 GMT
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
last-modified
Fri, 06 Nov 2020 22:28:19 GMT
server
AmazonS3
age
424003
etag
"840107c60632e151d3d4ed52457243db"
x-cache
Hit from cloudfront
x-amz-version-id
g54XEf4skAMSD4MV29N7aPk8wAUfSLu7
status
200
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
image/png
content-length
2919
x-amz-cf-id
Fe4YZFO2aqwxKs1l5iT709iW3-39fX38EVM9vbv4o5wc5Vkvkys_bQ==
84c1e40ea0e759e3f1505eb1788ddf3c_default_photo.png
content.invisioncic.com/Mmalware/set_resources_26/
1 KB
2 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/set_resources_26/84c1e40ea0e759e3f1505eb1788ddf3c_default_photo.png
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c9b19667188a7a142b2f9e0841928d3a2137bf476d158c86fa58f6bfb05a5f68

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 31 Aug 2020 12:40:39 GMT
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
last-modified
Mon, 31 Aug 2020 12:37:52 GMT
server
AmazonS3
age
6248245
etag
"22160b0ae87b0e3c12254f1115fb7bfd"
x-cache
Hit from cloudfront
x-amz-version-id
p8btRjpXp1K.ANvfx1i4ikKeehKQoQ_s
status
200
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
image/png
content-length
1290
x-amz-cf-id
qX4kDp7kowelPrTCZgh__F4PmraDMRRMxrsCOjMKIU6fUCO13gmd1Q==
MWB4_FreeDownload_728x90_v1.jpg.5b008278530bf816655dbb1ec796173c.jpg
content.invisioncic.com/Mmalware/monthly_2020_08/
16 KB
16 KB
Image
General
Full URL
https://content.invisioncic.com/Mmalware/monthly_2020_08/MWB4_FreeDownload_728x90_v1.jpg.5b008278530bf816655dbb1ec796173c.jpg
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 10 Sep 2020 07:37:07 GMT
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
last-modified
Tue, 25 Aug 2020 00:41:21 GMT
server
AmazonS3
age
5402457
etag
"f0356d9351192b59bc7db4b160684b81"
x-cache
Hit from cloudfront
x-amz-version-id
MNnZHAJMYhDJUF.vMbK1qXLuHRyyzGm1
status
200
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
image/jpeg
content-length
16292
x-amz-cf-id
eemC0G6leKDVoIRDWiVw-RIFHiDPaDx3sCSG0k2OUNkQ5nIA5wq_MQ==
root_library.js.gz
content.invisioncic.com/Mmalware/javascript_global/
384 KB
126 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
68dad018fc40f71617e7121f3da848755a4caae9fc75d39a3a4761e2fa8077c3

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:33:21 GMT
content-encoding
gzip
age
42283
x-cache
Hit from cloudfront
status
200
content-length
128831
last-modified
Fri, 06 Nov 2020 13:01:35 GMT
server
AmazonS3
etag
"96166afc0137746990f742a05abcd6d6"
x-amz-version-id
V5WdfuAtTOXH4F5lLsvNQcGm.ik3jYig
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
MfSBYh9HipkFjZb0hg7xdD6bG0cZxq5Gckc-mGwrqgsEHsFMdta1og==
root_js_lang_1.js.gz
content.invisioncic.com/Mmalware/javascript_global/
95 KB
30 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_js_lang_1.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6dc7b4c5d3ef5b87301a1b8abfee9b1a4f1c74ad176be1d07131959c4464be2b

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:33:21 GMT
content-encoding
gzip
age
42283
x-cache
Hit from cloudfront
status
200
content-length
30116
last-modified
Fri, 06 Nov 2020 13:01:35 GMT
server
AmazonS3
etag
"00304185b2d34641fd85cc20f69a7dc7"
x-amz-version-id
fLqOBqIAMe2qFfhOqcskXDH9bmb6DETV
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
sNjoAoFfaI7W6bt3RHHoPAdsfZC_dMPjKbfBqzLymYyGLg2bxmDjgg==
root_framework.js.gz
content.invisioncic.com/Mmalware/javascript_global/
410 KB
94 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_framework.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
549330dc943c91838c4daa4c4a4877f73ba0cdaaa64c63297b7d19fcbe804988

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:33:21 GMT
content-encoding
gzip
age
42283
x-cache
Hit from cloudfront
status
200
content-length
96243
last-modified
Fri, 06 Nov 2020 13:01:36 GMT
server
AmazonS3
etag
"42d60c34164862caf1c7735e7e8fcd00"
x-amz-version-id
b9Fbj51AZR4wZAcdClHy3BwVghNE1aMQ
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
E9Bv1Uz5q5mdXUSAKWn0tlKlo8q5DoyPGz8e3MJDF8BI-joEu--O0w==
global_global_core.js.gz
content.invisioncic.com/Mmalware/javascript_core/
36 KB
9 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/global_global_core.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8f233c33e9dcb6bf349b325180c0af34e3592912bd18b50689b8ec9d07b98507

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:33:21 GMT
content-encoding
gzip
age
42283
x-cache
Hit from cloudfront
status
200
content-length
8566
last-modified
Fri, 06 Nov 2020 13:01:36 GMT
server
AmazonS3
etag
"49c41f2a667f27fd81870a88ab5913e3"
x-amz-version-id
UwutSZ2tc1VsaDrC53hhf4dB.YQI.JSV
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
m84fl-RS6lalovaMjELUVgI2BhRNveUhPIyFMEn9PE_VeBmJv_za-g==
root_front.js.gz
content.invisioncic.com/Mmalware/javascript_global/
100 KB
22 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_front.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a694720b29172202c94d43079b330700ad754ec327f2811b878bba92609aabec

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:33:21 GMT
content-encoding
gzip
age
42283
x-cache
Hit from cloudfront
status
200
content-length
22211
last-modified
Fri, 06 Nov 2020 13:01:37 GMT
server
AmazonS3
etag
"62ecf5b007db32936fe052f363ee0ca9"
x-amz-version-id
i3D99AP8Izj4g3ohNVcG1C1bLGZWCEDV
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
mbIIswYjFvwJZg03JVTlA4jcdR3ceKWXL53AbDtGc5ADgjdlW51cIA==
front_front_core.js.gz
content.invisioncic.com/Mmalware/javascript_core/
26 KB
7 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/front_front_core.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
df7b04d07147501681c1006007535d55d399c2d9ee918bea2e2ef5a6962c82e9

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:34:13 GMT
content-encoding
gzip
age
42231
x-cache
Hit from cloudfront
status
200
content-length
6278
last-modified
Fri, 06 Nov 2020 13:01:37 GMT
server
AmazonS3
etag
"eb8ee735301d12a6260563dd8d48be1a"
x-amz-version-id
mNc2_okpGEJvTTK4fom62nIsDUXbw.pb
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
65rKkKNxUe1bLf5EU9xP_YDT3161jba0oiSjr85E3NlcAZwFWFPwAA==
front_front_topic.js.gz
content.invisioncic.com/Mmalware/javascript_forums/
4 KB
1 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_forums/front_front_topic.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1e353dd6f81b838bbc322417e995c5812bb61c1c891a31725da0acd0185efeaf

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:34:13 GMT
content-encoding
gzip
age
42231
x-cache
Hit from cloudfront
status
200
content-length
1108
last-modified
Thu, 05 Nov 2020 23:54:53 GMT
server
AmazonS3
etag
"994ac7e21afa71d446009d37cb840ae7"
x-amz-version-id
sISzyrNt84Pf0blexzGP.cfc_QrCDYLc
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
awVrMQ6Gu4UhIpcMlpTS0Yvy0kPH2lwd34l-_9a8owQBM6D-DtF1YA==
root_map.js.gz
content.invisioncic.com/Mmalware/javascript_global/
2 KB
739 B
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_global/root_map.js.gz?v=d815db93211605083591
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5e7d3cdd2d298309b204cb09cf9e02d1c18fa776cc2ef2c6e7d8e03e244dca34

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 08:34:13 GMT
content-encoding
gzip
age
42231
x-cache
Hit from cloudfront
status
200
content-length
322
last-modified
Wed, 11 Nov 2020 08:33:12 GMT
server
AmazonS3
etag
"7a4116235347013ef21b919349141421"
x-amz-version-id
KcEJQptDewG53MdnridOxe_lO84CsPN8
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
cache-control
public, max-age=31536000
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
content-type
text/javascript
x-amz-cf-id
1YUA_kEfYDSAUGGCSqbD5dilbNZWDH3MljVUd508ZGoLjcGwmHw-sw==
analytics.js
www.google-analytics.com/
46 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 23 Oct 2020 03:00:57 GMT
server
Golfe2
age
3735
date
Wed, 11 Nov 2020 19:15:48 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18817
expires
Wed, 11 Nov 2020 21:15:48 GMT
insight.min.js
snap.licdn.com/li.lms-analytics/
965 B
761 B
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:582::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
f10b9b0c4107ca5a40a5c69b1ac91a8948d84f39893dee6b429cdbdb05887093

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 11 Nov 2020 20:18:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Sep 2020 22:01:48 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=26979
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
448
2893.js
script.crazyegg.com/pages/scripts/0081/
3 KB
2 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0081/2893.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0fad69e675e60bf4ff15786bb96ca857fd275e3fe95bdcad01e3935b9c1f34ea

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
content-encoding
gzip
cf-cache-status
HIT
ce-version
11.1.143
age
400107
cf-polished
origSize=2833
status
200
cf-request-id
065a8e5d00000032609f3b6000000001
last-modified
Sat, 07 Nov 2020 05:09:36 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
cf-ray
5f0ab3419db73260-FRA
cf-bgj
minify
insight.beta.min.js
snap.licdn.com/li.lms-analytics/
4 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.beta.min.js
Requested by
Host: snap.licdn.com
URL: https://snap.licdn.com/li.lms-analytics/insight.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:10c:582::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
Software
/
Resource Hash
a8431bfe4316cdc20de936e824f735c9478bbc9ce3d3a51c774eca45faff637f

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 11 Nov 2020 20:18:03 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Sep 2020 22:01:48 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=27018
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1799
UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7W0Q5nw.woff2
fonts.gstatic.com/s/inter/v2/
36 KB
36 KB
Font
General
Full URL
https://fonts.gstatic.com/s/inter/v2/UcC73FwrK3iLTeHuS_fvQtMwCp50KnMa1ZL7W0Q5nw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Inter:300,300i,400,400i,500,700,700i
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f9bba27460b9836abf81fb74f66ce01b11aeebe183706bbc116ed2fdcb04433d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://forums.malwarebytes.com
Referer
https://fonts.googleapis.com/css?family=Inter:300,300i,400,400i,500,700,700i
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Sat, 07 Nov 2020 23:12:50 GMT
x-content-type-options
nosniff
last-modified
Fri, 26 Jun 2020 02:37:45 GMT
server
sffe
age
335113
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36564
x-xss-protection
0
expires
Sun, 07 Nov 2021 23:12:50 GMT
fontawesome-webfont.woff2
forums.malwarebytes.com/applications/core/interface/font/
75 KB
76 KB
Font
General
Full URL
https://forums.malwarebytes.com/applications/core/interface/font/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: content.invisioncic.com
URL: https://content.invisioncic.com/Mmalware/css_built_26/341e4a57816af3ba440d891ca87450ff_framework.css.gz?v=d815db93211604702223
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.225.73.94 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-73-94.fra2.r.cloudfront.net
Software
Apache/2.4.46 (Amazon) OpenSSL/1.0.2k-fips PHP/7.3.21 /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

Origin
https://forums.malwarebytes.com
Referer
https://content.invisioncic.com/Mmalware/css_built_26/341e4a57816af3ba440d891ca87450ff_framework.css.gz?v=d815db93211604702223
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 03 Sep 2020 02:50:22 GMT
via
1.1 e56e6732f380db727425bac2d6158761.cloudfront.net (CloudFront)
last-modified
Fri, 28 Aug 2020 15:42:00 GMT
server
Apache/2.4.46 (Amazon) OpenSSL/1.0.2k-fips PHP/7.3.21
age
6024460
etag
"12d68-5adf1e4bf0200"
x-cache
Hit from cloudfront
status
200
cache-control
max-age=31536000, public
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
77160
x-amz-cf-id
2rM9PKvGlnjBpGynpG9r4PlJAEr7Z-JS6WKJ-OuMVu7H7VWYa-Vb4g==
collect
www.google-analytics.com/j/
4 B
75 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j87&a=858463363&t=pageview&_s=1&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&ul=en-us&de=UTF-8&dt=Random%20i_Bongacash%20javascript%20injection%20-%20Resolved%20Malware%20Removal%20Logs%20-%20Malwarebytes%20Forums&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=874315032&gjid=600140874&cid=2009084776.1605125883&tid=UA-3347303-10&_gid=84383813.1605125883&_r=1&_slc=1&z=2028891607
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 11 Nov 2020 20:18:03 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
text/plain
access-control-allow-origin
https://forums.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/j/
4 B
93 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j87&tid=UA-3347303-10&cid=2009084776.1605125883&jid=874315032&gjid=600140874&_gid=84383813.1605125883&_u=IEBAAEAAAAAAAC~&z=549513326
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9d Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Wed, 11 Nov 2020 20:18:03 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://forums.malwarebytes.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
rum.js
rum.uptime.com/static/rum/compiled/
999 B
1 KB
Script
General
Full URL
https://rum.uptime.com/static/rum/compiled/rum.js
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.138.42.56 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-138-42-56.us-east-2.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
9081ab408728b06cbe245cf9fb674a8f2605800db4d1f20dc992579135c8c00b

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
last-modified
Sun, 08 Nov 2020 11:38:13 GMT
server
nginx/1.14.0 (Ubuntu)
etag
"5fa7d8a5-3e7"
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
content-length
999
expires
Wed, 18 Nov 2020 20:18:03 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D2594100%26time%3D1605125883460%26url%3Dhttps%253A%252F%252Fforums.malwarebytes.co...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&liSync=true
0
78 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&liSync=true
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
0
x-li-uuid
2k/ipXyNRhawacI5TCsAAA==

Redirect headers

content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id lnkd.demdex.net blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ www.google-analytics.com static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/ platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-content-type-options
nosniff
linkedin-action
1
status
302
content-length
0
x-li-uuid
jbipoXyNRhbwDiaX3ioAAA==
pragma
no-cache
x-li-pop
afd-prod-edc2
x-msedge-ref
Ref A: 2D874A8E957347B0B249C2352CA742BC Ref B: FRAEDGE0816 Ref C: 2020-11-11T20:18:03Z
x-frame-options
sameorigin
date
Wed, 11 Nov 2020 20:18:03 GMT
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=2594100&time=1605125883460&url=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
ga-audiences
www.google.com/ads/
42 B
106 B
Image
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j87&tid=UA-3347303-10&cid=2009084776.1605125883&jid=874315032&_u=IEBAAEAAAAAAAC~&z=944140150
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Nov 2020 20:18:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
42 B
106 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j87&tid=UA-3347303-10&cid=2009084776.1605125883&jid=874315032&_u=IEBAAEAAAAAAAC~&z=944140150
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 11 Nov 2020 20:18:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
2893.json
script.crazyegg.com/pages/data-scripts/0081/
558 B
589 B
XHR
General
Full URL
https://script.crazyegg.com/pages/data-scripts/0081/2893.json?t=5350419
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0081/2893.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c4803e66ad1d2099ae6bd90810453f1678452a40f5067a41f880a60c65c3335a

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
content-encoding
gzip
cf-cache-status
HIT
age
397413
ce-version
11.1.143
status
200
content-length
227
cf-request-id
065a8e5e6700002bc2c7ab8000000001
last-modified
Sat, 07 Nov 2020 05:54:30 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
cf-ray
5f0ab343de982bc2-FRA
demandbase-forms.js
www.malwarebytes.com/js/
3 KB
1 KB
Script
General
Full URL
https://www.malwarebytes.com/js/demandbase-forms.js?d=2020-02-04-15-03-08--0800
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-MKSKW3
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:4000:8:d3fb:39c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5576e25dd8a4d45e90da43e0f127c4efb4d16eebcb7a1bc55fbb66e7cf504f9d

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:04 GMT
content-encoding
gzip
last-modified
Tue, 10 Nov 2020 23:44:43 GMT
server
AmazonS3
x-amz-cf-pop
ZRH50-C1
etag
"cb45a71066aa90353febec3e66fe17d4"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
F6jgz7aIWM42FtFi8gQOjRYw49z1Oi9Z0FAbPcGNopY60NWaRRjQTw==
via
1.1 af287426c130b47dba79bf825f91ebbb.cloudfront.net (CloudFront)
index.php
forums.malwarebytes.com/
2 B
442 B
XHR
General
Full URL
https://forums.malwarebytes.com/index.php?app=core&module=system&controller=ajax&do=attachmentInfo&csrfKey=1eb99469296b7cb256fd3480e3a68ea6&attachIDs%5B276817%5D=true&attachIDs%5B276818%5D=true&attachIDs%5B276819%5D=true
Requested by
Host: content.invisioncic.com
URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.225.73.94 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-225-73-94.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
Security Headers
Name Value
X-Frame-Options sameorigin
X-Xss-Protection 0

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:03 GMT
content-encoding
gzip
vary
cookie,Accept-Encoding
x-amz-cf-pop
FRA2-C2
x-cache
Miss from cloudfront
status
200
content-length
22
x-xss-protection
0
x-ips-loggedin
0
pragma
no-cache
server
Apache
x-frame-options
sameorigin
content-type
application/json;charset=UTF-8
via
1.1 e56e6732f380db727425bac2d6158761.cloudfront.net (CloudFront)
cache-control
no-store, no-cache, must-revalidate
x-amz-cf-id
bEh8361cZNpZGFKI4AulZPF-txnQ11cRMdw54dg5FKnTc776-ZzihA==
expires
Thu, 19 Nov 1981 08:52:00 GMT
HWyTnY16.min.js
scripts.demandbase.com/
59 KB
16 KB
Script
General
Full URL
https://scripts.demandbase.com/HWyTnY16.min.js
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.224.93.80 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-93-80.zrh50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
009035425552e482b1ae9c4a5431aa53ca93b842120959703c8a7277a06a336f

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-amz-version-id
G_I1nzXs6N7en1Yo2P1mWO8aaOEwwr_e
content-encoding
gzip
last-modified
Thu, 03 Sep 2020 14:12:04 GMT
server
AmazonS3
age
244
etag
"9e4a5c172d9ba1d2c711305ace1fa4be"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=3600
date
Wed, 11 Nov 2020 20:14:00 GMT
x-amz-cf-pop
ZRH50-C1
x-amz-cf-id
lNig10OSIKyCFA8M_2lmzn1SkPUO8okpcn_ve8y54eftCv-EOxCGqQ==
via
1.1 aa001e3127bb5bd7bbc48bc4fef44b79.cloudfront.net (CloudFront)
ip.json
api.company-target.com/api/v2/
436 B
944 B
XHR
General
Full URL
https://api.company-target.com/api/v2/ip.json?referrer=&page=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&page_title=Random%20i_Bongacash%20javascript%20injection%20-%20Resolved%20Malware%20Removal%20Logs%20-%20Malwarebytes%20Forums&src=tag&key=5527c2aa519592df7d44a24d0105731b
Requested by
Host: scripts.demandbase.com
URL: https://scripts.demandbase.com/HWyTnY16.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.224.93.30 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-93-30.zrh50.r.cloudfront.net
Software
nginx /
Resource Hash
43424d26c588fc0d2f8cac6f25354a061a60683b3a8c535fed092795e903c75c

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:04 GMT
identification-source
CENTRAL
vary
Accept-Encoding, Origin
x-amz-cf-pop
ZRH50-C1
x-cache
Miss from cloudfront
status
200
request-id
2776cc76-dfcf-4c75-99a4-857a9486b70f
content-encoding
gzip
pragma
no-cache
access-control-allow-origin
https://forums.malwarebytes.com
server
nginx
access-control-max-age
7200
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/json;charset=utf-8
via
1.1 f0f5607a03d2ae4c43b553dc2cef0c9e.cloudfront.net (CloudFront)
access-control-expose-headers
cache-control
no-cache, no-store, max-age=0, must-revalidate
access-control-allow-credentials
true
api-version
v2
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
x-amz-cf-id
1P_qyEDHAVR5pqItbAOxSmGWL_5W6lF-2ooYhh6SV4_CSyFIZZ8N8w==
expires
Tue, 10 Nov 2020 20:18:04 GMT
validateCookie
segments.company-target.com/
Redirect Chain
  • https://match.prod.bidr.io/cookie-sync/demandbase
  • https://match.prod.bidr.io/cookie-sync/demandbase?_bee_ppp=1
  • https://segments.company-target.com/log?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ
  • https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ&verifyHash=13b3aa2956d11468fdf3c64af54fae1b05f8e66
26 B
409 B
Image
General
Full URL
https://segments.company-target.com/validateCookie?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ&verifyHash=13b3aa2956d11468fdf3c64af54fae1b05f8e66
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.93.99 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-93-99.zrh50.r.cloudfront.net
Software
/
Resource Hash
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 11 Nov 2020 20:18:04 GMT
Via
1.1 0c476b4e93e7b13a5f68b185a8e9753c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
ZRH50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Content-Type
image/gif
Transfer-Encoding
chunked
Connection
keep-alive
trace-id
ea2c232b7b9ba8ec
X-Amz-Cf-Id
13F_IxovdHcYdDPFhXIuH-JIpWoLowMBFoO51msOB19Xqpk18K9d5g==

Redirect headers

Date
Wed, 11 Nov 2020 20:18:04 GMT
Via
1.1 0c476b4e93e7b13a5f68b185a8e9753c.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
ZRH50-C1
Vary
Origin
X-Cache
Miss from cloudfront
Location
/validateCookie?vendor=choca&user_id=AADq906_WI4AABCdco_tjQ&verifyHash=13b3aa2956d11468fdf3c64af54fae1b05f8e66
Connection
keep-alive
trace-id
9c833e8ebcccc65e
Content-Length
0
X-Amz-Cf-Id
JVwddaH_i5Jqj4vA7IDxXBgv4pNplvWXMKhJvg4yPNxBj4iDS_yhwA==
front_front_widgets.js.gz
content.invisioncic.com/Mmalware/javascript_core/
16 KB
5 KB
Script
General
Full URL
https://content.invisioncic.com/Mmalware/javascript_core/front_front_widgets.js.gz?v=d815db93211605083591&csrfKey=1eb99469296b7cb256fd3480e3a68ea6&antiCache=d815db93211605083591
Requested by
Host: content.invisioncic.com
URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:f800:1e:ebe7:1480:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9fc3c29e575bd95027c438686154d87cafaa5a4d8151b01d82cdb9788d332d60

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 11 Nov 2020 20:18:05 GMT
content-encoding
gzip
last-modified
Fri, 06 Nov 2020 00:08:56 GMT
server
AmazonS3
x-amz-cf-pop
ZRH50-C1
etag
"d282a2e7315d7cf7ea63cc2f4ef3792d"
x-cache
Miss from cloudfront
x-amz-version-id
yg33gdqv4QAwN39w3zdbu01Y8U8beUl2
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
content-type
text/javascript
content-length
4218
via
1.1 e92dffa8673a73c15c61e7c3abefc47d.cloudfront.net (CloudFront)
x-amz-cf-id
mtCuWe4uBergFtxAprPu1HUjZx0oeR4RGMWdSavfOhHt9_WTvA3Enw==
collect
www.google-analytics.com/
35 B
122 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j87&a=858463363&t=event&ni=1&_s=2&dl=https%3A%2F%2Fforums.malwarebytes.com%2Ftopic%2F245131-random-i_bongacash-javascript-injection%2F&ul=en-us&de=UTF-8&dt=Random%20i_Bongacash%20javascript%20injection%20-%20Resolved%20Malware%20Removal%20Logs%20-%20Malwarebytes%20Forums&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=Demandbase&ea=API%20Resolution&el=IP%20API&_u=aHBAAEABAAAAAC~&jid=&gjid=&cid=2009084776.1605125883&tid=UA-3347303-10&_gid=84383813.1605125883&cd2=(Non-Company%20Visitor)&cd3=Bot&cd4=(Non-Company%20Visitor)&cd5=(Non-Company%20Visitor)&cd6=(Non-Company%20Visitor)&cd7=(Non-Company%20Visitor)&cd8=(Non-Company%20Visitor)&cd9=(Non-Company%20Visitor)&cd10=(Non-Company%20Visitor)&cd11=Copenhagen&cd12=84&cd13=(Non-Company%20Visitor)&cd14=(Non-Company%20Visitor)&cd15=(Non-Company%20Visitor)&cd16=(Non-Company%20Visitor)&cd17=DK&cd18=(Non-Company%20Visitor)&z=1404961395
Requested by
Host: forums.malwarebytes.com
URL: https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:81a::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 10 Nov 2020 22:29:50 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
78494
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
record-data
rum.uptime.com/rum/
50 B
425 B
XHR
General
Full URL
https://rum.uptime.com/rum/record-data
Requested by
Host: rum.uptime.com
URL: https://rum.uptime.com/static/rum/compiled/rum.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.138.42.56 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-138-42-56.us-east-2.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
80e5bed8abe6565cca6546c035015b5aa7f5989e9beff4736d47a8052793f7c7
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://forums.malwarebytes.com/topic/245131-random-i_bongacash-javascript-injection/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Wed, 11 Nov 2020 20:18:04 GMT
status
200
server
nginx/1.14.0 (Ubuntu)
x-frame-options
SAMEORIGIN
vary
Cookie
content-type
application/json
access-control-allow-origin
*
cache-control
max-age=0, no-cache, no-store, must-revalidate
content-length
50
expires
Wed, 11 Nov 2020 20:18:04 GMT

Verdicts & Comments Add Verdict or Comment

53 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| dataLayer object| google_tag_manager function| postscribe number| hshInterval string| GoogleAnalyticsObject function| ga string| _linkedin_data_partner_id object| google_tag_data object| gaplugins object| gaGlobal object| gaData boolean| ipsDebug string| CKEDITOR_BASEPATH object| ipsSettings object| Debug object| ips function| _ function| $ function| jQuery function| EvEmitter function| imagesLoaded object| Mustache object| jstz object| linkify function| Hammer function| XRegExp boolean| PR_SHOULD_USE_CONTINUATION function| prettyPrintOne function| prettyPrint object| PR function| recaptcha2Callback function| escapeRegExp object| ipsJavascriptMap object| _uptime_rum function| lintrk boolean| _already_called_lintrk object| CE2 string| CE_USER_DATA_URL string| fieldIds object| fields function| expandFormFields function| showAllFields function| hideFormFields function| demandbaseLoaded function| __extends object| Demandbase object| __db function| DBSegment undefined| demandbaseMarketoFormId

0 Cookies

6 Console Messages

Source Level URL
Text
console-api log URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 10)
Message:
JQMIGRATE: Migrate is installed with logging active, version 3.3.0
console-api warning URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 12)
Message:
JQMIGRATE: jQuery.fn.bind() is deprecated
console-api log URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 12)
Message:
console.trace
console-api warning URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 12)
Message:
JQMIGRATE: JQMIGRATE: jQuery.cssProps is deprecated
console-api log URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 12)
Message:
console.trace
console-api log URL: https://content.invisioncic.com/Mmalware/javascript_global/root_library.js.gz?v=d815db93211605083591(Line 71)
Message:
%cThis is a browser feature intended for developers. Do not paste any code here given to you by someone else. It may compromise your account or have other negative side effects. font-weight: bold; font-size: 14px;

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options sameorigin
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

api.company-target.com
content.invisioncic.com
fonts.googleapis.com
fonts.gstatic.com
forums.malwarebytes.com
match.prod.bidr.io
px.ads.linkedin.com
rum.uptime.com
script.crazyegg.com
scripts.demandbase.com
segments.company-target.com
snap.licdn.com
stats.g.doubleclick.net
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.linkedin.com
www.malwarebytes.com
13.224.93.30
13.224.93.80
13.224.93.99
13.225.73.94
2600:9000:2190:4000:8:d3fb:39c0:93a1
2600:9000:2190:f800:1e:ebe7:1480:93a1
2606:4700::6813:9408
2620:1ec:21::14
2a00:1450:4001:801::2003
2a00:1450:4001:806::200a
2a00:1450:4001:809::2003
2a00:1450:4001:809::2004
2a00:1450:4001:81a::200e
2a00:1450:4001:820::2008
2a00:1450:400c:c00::9d
2a02:26f0:10c:582::25ea
2a05:f500:10:101::b93f:9105
3.138.42.56
54.72.203.0
009035425552e482b1ae9c4a5431aa53ca93b842120959703c8a7277a06a336f
0fad69e675e60bf4ff15786bb96ca857fd275e3fe95bdcad01e3935b9c1f34ea
1163516775488cf1fd48ff94d90cdf91807668288c87c7018cf380e01668af06
1b128e2c2ec5d360ee5a571e34fb8afb5e7f3c9c0ac159132c8a2c23305a8295
1e353dd6f81b838bbc322417e995c5812bb61c1c891a31725da0acd0185efeaf
208392c679aa35641114b1aeb27e6e44d41c82fe373d047784622de7b4f620d9
24c13cdea638620ec96bc3b7ba1bdef0cbe3ad0847b2ddc6f041df1fa24cffa4
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
349c48c1181990de28c97ff83f1bdb625ae379beaa775fc8f6f47a72017057fd
3b7b8a4b411ddf8db9bacc2f3aabf406f8e4c0c087829b336ca331c40adfdff1
43424d26c588fc0d2f8cac6f25354a061a60683b3a8c535fed092795e903c75c
44c618bb34d9cbba13bf68465b02308390d384f62f38f0c25b2acaf3244addcd
4e0f39543ae4c15cfe3222f68e358c416dc79cb262c16c8d5b46281a5d850f40
4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
549330dc943c91838c4daa4c4a4877f73ba0cdaaa64c63297b7d19fcbe804988
5576e25dd8a4d45e90da43e0f127c4efb4d16eebcb7a1bc55fbb66e7cf504f9d
57c3f04fbb9639231d4264b8274b69bbc380d63ffa8bac95a71a414c25a9db7e
5e7d3cdd2d298309b204cb09cf9e02d1c18fa776cc2ef2c6e7d8e03e244dca34
68dad018fc40f71617e7121f3da848755a4caae9fc75d39a3a4761e2fa8077c3
6dc7b4c5d3ef5b87301a1b8abfee9b1a4f1c74ad176be1d07131959c4464be2b
73c6d9bea582fd9ea44e6f647006f9ef8b4af0c15199ff20bd524186913eb9e2
80e5bed8abe6565cca6546c035015b5aa7f5989e9beff4736d47a8052793f7c7
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
84925038dd75196a324b3a9935a6b11a0311ca9c0c594eda0bf8fc40e169e525
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
866c2a38455e522821a726e8e31dc49f0f80dc374872193a4fbfd72d9f968fe7
89973490736c0f03b42a2d3a6d6159e1a897e40c0127d95760867eaa990c9e59
8f233c33e9dcb6bf349b325180c0af34e3592912bd18b50689b8ec9d07b98507
9081ab408728b06cbe245cf9fb674a8f2605800db4d1f20dc992579135c8c00b
94d1fdd565eca2f8ae9371da1c817dff600bc47a0b97faad8f30617d5557efe2
9fc3c29e575bd95027c438686154d87cafaa5a4d8151b01d82cdb9788d332d60
a694720b29172202c94d43079b330700ad754ec327f2811b878bba92609aabec
a8431bfe4316cdc20de936e824f735c9478bbc9ce3d3a51c774eca45faff637f
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
b0ea0d64d469caa762582220ab54e60e75d32f807f174199051244b51ed4f99d
c4803e66ad1d2099ae6bd90810453f1678452a40f5067a41f880a60c65c3335a
c9b19667188a7a142b2f9e0841928d3a2137bf476d158c86fa58f6bfb05a5f68
df7b04d07147501681c1006007535d55d399c2d9ee918bea2e2ef5a6962c82e9
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e441c3e2771625ba05630ab464275136a82c99650ee2145ca5aa9853bedeb01b
e7bbb9e4ad05f3991988e27bc1936a7a3e6edcf991f6e585af0516243502e781
eac6ebb9761f39a252e767afaac53c70da72da8bc38814782724bcc09117ca64
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
f10b9b0c4107ca5a40a5c69b1ac91a8948d84f39893dee6b429cdbdb05887093
f9bba27460b9836abf81fb74f66ce01b11aeebe183706bbc116ed2fdcb04433d