![](/screenshots/f8ed0b4f-01ee-435d-90c2-e8a6ead8ccdf.png)
main.d1yoipuca73qa0.amplifyapp.com
Open in
urlscan Pro
13.32.50.78
Malicious Activity!
Public Scan
Submission: On December 11 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on December 10th 2023. Valid for: a year.
This is the only time main.d1yoipuca73qa0.amplifyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 13.32.50.78 13.32.50.78 | 16509 (AMAZON-02) (AMAZON-02) | |
12 | 1 |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-50-78.nrt57.r.cloudfront.net
main.d1yoipuca73qa0.amplifyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
amplifyapp.com
main.d1yoipuca73qa0.amplifyapp.com |
242 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | main.d1yoipuca73qa0.amplifyapp.com |
main.d1yoipuca73qa0.amplifyapp.com
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.d1yoipuca73qa0.amplifyapp.com Amazon RSA 2048 M02 |
2023-12-10 - 2025-01-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/?bcda=(0101)-50555-94769
Frame ID: E6FE52A07F24AB38C350BE2302EB3F91
Requests: 12 HTTP requests in this frame
Screenshot
![](/screenshots/f8ed0b4f-01ee-435d-90c2-e8a6ead8ccdf.png)
Page Title
マイクロソフトのセキュリティDetected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/ |
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.7.1.min.js
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/js/ |
59 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom.js
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/js/ |
1 KB 927 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom.css
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
defend.png
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x.png
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/images/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v.jpg
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/images/ |
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ms.png
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
back.jpg
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/images/ |
111 KB 111 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
alert-en.wav
main.d1yoipuca73qa0.amplifyapp.com/werrx01USAHTML/js/ |
316 KB 0 |
Media
audio/wave |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery number| uidEvent object| bootstrap function| getQueryParam function| dadasdwqerewqaasd string| bcda0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
main.d1yoipuca73qa0.amplifyapp.com
13.32.50.78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