Submitted URL: https://dw.malavida.com/OUZoaG1qNC9yMklHY1UvWTdleEVmQlhPSXpJK1NReGcyRTZGa3ZJREJ4UE5IZjFQdlUxdFVvTGtnUXFnZ2x3anhsV0VOZ/nR...
Effective URL: https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe
Submission: On June 01 via manual from PL — Scanned from ES

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 5.145.168.48, located in Madrid, Spain and belongs to COMVIVE-AS Seville - Spain, ES. The main domain is dw23.malavida.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on June 2nd 2022. Valid for: a year.
This is the only time dw23.malavida.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Downloads These files were downloaded by the website

MIME: PE32 executable (GUI) Intel 80386, for MS Windows
Size: 1 MB (1495504 bytes, 100% done)
Downloaded from: https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe

Domain & IP information

IP Address AS Autonomous System
1 1 5.145.168.100 39020 (COMVIVE-A...)
1 2 5.145.168.48 39020 (COMVIVE-A...)
1 1
Apex Domain
Subdomains
Transfer
3 malavida.com
dw.malavida.com — Cisco Umbrella Rank: 686704
dw23.malavida.com
1 KB
1 1
Domain Requested by
2 dw23.malavida.com 1 redirects
1 dw.malavida.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
*.malavida.com
Sectigo RSA Domain Validation Secure Server CA
2022-06-02 -
2023-07-02
a year crt.sh

This page contains 1 frames:

Primary Page: https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe
Frame ID: CB55F39D5096073E90E2DF1E261B69E9
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

2
Subdomains

1
IPs

1
Countries

0 kB
Transfer

0 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request EAappInstaller.exe
dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/
Redirect Chain
  • https://dw.malavida.com/OUZoaG1qNC9yMklHY1UvWTdleEVmQlhPSXpJK1NReGcyRTZGa3ZJREJ4UE5IZjFQdlUxdFVvTGtnUXFnZ2x3anhsV0VOZ/nRaKzRjOHFWWWZIOWhyVFNzNjhQNW9zL1BVamJjT3A0ei9obXdrYVgyUGN2bWd5elNxaFR2KzRwRmEx...
  • https://dw23.malavida.com/check/5bb4ec566e224d4a0c97a7337eef76dc5c858c632cd9ffcc23a2fcc90457cce1/f58dae9097be59ee4be9bb71e7781aac
  • https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe
0
0
Document
General
Full URL
https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
5.145.168.48 Madrid, Spain, ASN39020 (COMVIVE-AS Seville - Spain, ES),
Reverse DNS
mail.s48-168.furanet.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.90 Safari/537.36
accept-language
es-ES,es;q=0.9

Response headers

accept-ranges
bytes
cache-control
public
content-length
1495504
content-type
application/x-dosexec
date
Thu, 01 Jun 2023 07:25:04 GMT
last-modified
Wed, 19 Oct 2022 15:18:02 GMT
server
Apache
x-robots-tag
noindex

Redirect headers

cache-control
max-age=0, must-revalidate, private
content-type
text/html; charset=UTF-8
date
Thu, 01 Jun 2023 07:25:04 GMT
location
https://dw23.malavida.com/dwn/0b5c657064a4db1859c76fa7431e28a3ea73206ad1b0ae6447612b1dc78a923c/EAappInstaller.exe
referer
https://www.malavida.com/en/soft/fifa/download
server
Apache
x-robots-tag
noindex

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend

1 Cookies

Domain/Path Name / Value
.malavida.com/ Name: MALAVIDADWNTOKEN
Value: eyJpdiI6ImhRSkwyUnZBQ3RLTytzektmbGtpdkE9PSIsInZhbHVlIjoiclhXOXNtV3ZJbnNPckxRWFhlTm1lQUtZdEpCalZWXC9qZlNSRk1YWExMTU96bkI2dWhpNHlhcml5RnByTUZEVFJ4OWtsdVl6NUYwQ0hxcmkzNWVCdVBiVTJ1RTkxblN4THFcL1ZDVnVlYVJDdz0iLCJtYWMiOiJlYzM3NWRlMDE4NmNiYzM1OTBhMGUyODNhZGU4MTBhYzJlMGFjOGE1ODNiYTQyMWE3ZDQ4NDYyYmYyNjQxZTk0In0%3D

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

dw.malavida.com
dw23.malavida.com
5.145.168.100
5.145.168.48