f000.backblazeb2.com
Open in
urlscan Pro
104.153.233.177
Malicious Activity!
Public Scan
Effective URL: https://f000.backblazeb2.com/file/flying-descriptor-e26db42a/index.html
Submission: On January 27 via manual from US
Summary
TLS certificate: Issued by R3 on December 9th 2020. Valid for: 3 months.
This is the only time f000.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.11 67.199.248.11 | 396982 (GOOGLE-PR...) (GOOGLE-PRIVATE-CLOUD) | |
2 | 104.153.233.177 104.153.233.177 | 32354 (UNWIRED) (UNWIRED) | |
12 | 2606:4700:303... 2606:4700:3033::ac43:82ba | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
jupitersmt.com
jupitersmt.com |
241 KB |
2 |
backblazeb2.com
f000.backblazeb2.com |
76 KB |
1 |
bit.ly
1 redirects
bit.ly |
283 B |
14 | 3 |
Domain | Requested by | |
---|---|---|
12 | jupitersmt.com |
f000.backblazeb2.com
|
2 | f000.backblazeb2.com |
f000.backblazeb2.com
|
1 | bit.ly | 1 redirects |
14 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2020-12-09 - 2021-03-09 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-01 - 2021-10-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://f000.backblazeb2.com/file/flying-descriptor-e26db42a/index.html
Frame ID: 9E38466FC209C0C3E750272B6367F5AC
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bit.ly/36jBt1R
HTTP 301
https://f000.backblazeb2.com/file/flying-descriptor-e26db42a/index.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bit.ly/36jBt1R
HTTP 301
https://f000.backblazeb2.com/file/flying-descriptor-e26db42a/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
f000.backblazeb2.com/file/flying-descriptor-e26db42a/ Redirect Chain
|
76 KB 76 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
jupitersmt.com/email-list/dropboxcxcx22/img/ |
157 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
10.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
12.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
jupitersmt.com/email-list/dropboxcxcx22/img/ |
94 KB 95 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
f000.backblazeb2.com/file/flying-descriptor-e26db42a/img/ |
94 B 94 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| _0x3dfd function| _0x4bd2 object| Zlib function| templatePage0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.ly
f000.backblazeb2.com
jupitersmt.com
104.153.233.177
2606:4700:3033::ac43:82ba
67.199.248.11
10954634b697781f7868941ae52e272f9b6b8817ddb45405d6713fd7496b85be
19f9b874cb353eabd3995bd86fb24f2e7bb19c6b0eb2f6a280a9c74dc2c42aa1
3724402e444447c43c55554b01a91204ab38314bec788e2458b7cad112bf614e
3d8e438c5f6a243fc8f81061dc2d00854fac5ad5b4cca87639d4095f29bc0129
414e7f5b3a30e7f608dd3838409092bf8dd47c19bbbaf32be3c235a14b5ea2e7
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
73bfffb999b9979b23b7788d75c1e3f57d13c2ce6ed3729b7852b9a50eedcdd4
7641528292d5b3f033bc90e0f70757be629dd60092b63ab77d087a16745e6ef5
a51541c50e41e5e521bcfa4dd6175ad9f2f57287d1932c4ca8d9637007f078ff
a87ef7b2a413f234985afa048f77baf7911825ddda1a8b3610fecdd2c3093272
adfd07de1b4bbe23f8e4f7eedddc6fde432a2406f5487fd299a82d6616ff2779
bc7d62b5e732fd38160532e48780cb53fd0de4a7e85b2b24b914ebf10e074866
e20b9371531b230f9aed947f14294d4d5e88bda62332e9242609dee8cc0af66e
e71e76473b99fccdb728ad0c93cebc97129b379194439c00b95d99026d2f79df