Analysis Report Direct Deposit.xlsx

Overview

General Information

Sample Name: Direct Deposit.xlsx
Analysis ID: 323781
MD5: 69e51c55e817ad606af9c380ff76ea90
SHA1: 0385a74d84fbf8964d363fb979ecf6afe14b5eba
SHA256: c38e8675fe9efcc6c74ac66c182c58d458b091d14ababda785b3144e3fbbfe6f
Tags: xlsx

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 60
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish_10
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
IP address seen in connection with other malware
Invalid 'forgot password' link found
JA3 SSL client fingerprint seen in connection with other malware

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://secure-excel-file.glitch.me/ UrlScan: Label: phishing brand: generic microsoft Perma Link

Phishing:

barindex
Yara detected HtmlPhish_10
Source: Yara match File source: 128757.0.links.csv, type: HTML
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\07D9KDVU.htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://secure-excel-file.glitch.me/ Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Number of links: 0
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Title: Sign in to your account does not match URL
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Title: Sign in to your account does not match URL
Invalid 'forgot password' link found
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Invalid link: Forgot my password
Source: https://secure-excel-file.glitch.me/ HTTP Parser: Invalid link: Forgot my password
Source: https://secure-excel-file.glitch.me/ HTTP Parser: No <meta name="author".. found
Source: https://secure-excel-file.glitch.me/ HTTP Parser: No <meta name="author".. found
Source: https://secure-excel-file.glitch.me/ HTTP Parser: No <meta name="copyright".. found
Source: https://secure-excel-file.glitch.me/ HTTP Parser: No <meta name="copyright".. found

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 172.217.168.2 172.217.168.2
Source: Joe Sandbox View IP Address: 172.217.168.2 172.217.168.2
Source: Joe Sandbox View IP Address: 50.87.153.159 50.87.153.159
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3EA4068F.png Jump to behavior
Source: global traffic HTTP traffic detected: GET /vendor/doctrine/styles.css HTTP/1.1Accept: text/css, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: ibuykenya.comDNT: 1Connection: Keep-Alive
Source: unknown DNS traffic detected: queries for: linktr.ee
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.3.dr String found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.3.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 07D9KDVU.htm.3.dr String found in binary or memory: http://ibuykenya.com/vendor/doctrine/styles.css
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: http://jquery.org/license
Source: popper.min[1].js.3.dr String found in binary or memory: http://opensource.org/licenses/MIT).
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
Source: imagestore.dat.3.dr String found in binary or memory: http://www.imagemagick.org
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
Source: f[1].txt.3.dr String found in binary or memory: https://bid.g.doubleclick.net/xbbe/pixel?d=KAE
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.chromium.org/p/chromium/issues/detail?id=378607
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.chromium.org/p/chromium/issues/detail?id=449857
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.chromium.org/p/chromium/issues/detail?id=470258
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.chromium.org/p/chromium/issues/detail?id=589347
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.jquery.com/ticket/12359
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.jquery.com/ticket/13378
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.webkit.org/show_bug.cgi?id=136851
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.webkit.org/show_bug.cgi?id=137337
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugs.webkit.org/show_bug.cgi?id=29084
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=687787
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://cnhind-onmicrosoft-com.ml/email.php
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.1.1.min.js
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.2.1.slim.min.js
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://code.jquery.com/jquery-3.3.1.js
Source: excel.O365[1].htm.3.dr String found in binary or memory: https://d1fdloi71mui9q.cloudfront.net/YS99cwPS1yJGdXcJU31Y_62xa7aqirVCeh6yn);background-image:url(ht
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://developer.mozilla.org/en-US/docs/CSS/display
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://drafts.csswg.org/cssom/#common-serializing-idioms
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://drafts.csswg.org/cssom/#resolved-values
Source: free-fa-regular-400[1].eot.3.dr, free.min[1].css.3.dr String found in binary or memory: https://fontawesome.com
Source: free.min[1].css.3.dr String found in binary or memory: https://fontawesome.com/license/free
Source: free-fa-regular-400[1].eot.3.dr, free-fa-solid-900[1].eot.3.dr String found in binary or memory: https://fontawesome.comhttps://fontawesome.comFont
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://fonts.googleapis.com/css?family=Archivo
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/archivonarrow/v12/tss0ApVBdCYD5Q7hcxTE1ArZ0bbwiXo.woff)
Source: css2[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/capriola/v8/wXKoE3YSppcvo1PDln__.woff)
Source: css2[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/karla/v14/qkBIXvYC6trAT55ZBi1ueQVIjQTD-JqqFw.woff)
Source: css2[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/karla/v14/qkBIXvYC6trAT55ZBi1ueQVIjQTDH52qFw.woff)
Source: css2[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/karla/v14/qkBIXvYC6trAT55ZBi1ueQVIjQTDJp2qFw.woff)
Source: css2[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/karla/v14/qkBIXvYC6trAT55ZBi1ueQVIjQTDppqqFw.woff)
Source: bootstrap.min[1].css.3.dr, bootstrap.min[1].js.3.dr String found in binary or memory: https://getbootstrap.com)
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://github.com/eslint/eslint/issues/3229
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://github.com/eslint/eslint/issues/6125
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://github.com/jquery/jquery/pull/557)
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://github.com/jquery/sizzle/pull/225
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://github.com/jrburke/requirejs/wiki/Updating-existing-libraries#wiki-anon
Source: bootstrap.min[1].css.3.dr, bootstrap.min[1].js.3.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: bootstrap.min[1].js.3.dr String found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/#strip-and-collapse-whitespace
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/forms.html#category-listed
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/forms.html#concept-fe-disabled
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/forms.html#concept-option-disabled
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/scripting.html#selector-disabled
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/scripting.html#selector-enabled
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://html.spec.whatwg.org/multipage/syntax.html#attributes-2
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://i.ibb.co/crr44kK/bg5.png
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://infra.spec.whatwg.org/#strip-and-collapse-ascii-whitespace
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://jquery.com/
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://jquery.org/license
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://jsperf.com/getall-vs-sizzle/2
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://jsperf.com/thor-indexof-vs-for/5
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://kit.fontawesome.com/585b051251.js
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefile
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefile6Excel
Source: {7E9128FA-3101-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefile6ExcelRoot
Source: {7E9128FA-3101-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefile6Excelile.glitch.me/eRoot
Source: {7E9128FA-3101-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefileRoot
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://linktr.ee/excel.O365.securefilep
Source: imagestore.dat.3.dr String found in binary or memory: https://linktr.ee/static/favicon.png.
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://logo.clearbit.com/
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/bootstrap.min.js
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://outlook.office365.com/owa/&resource=00000002-0000-0ff1-ce00-000000000000&response_mode=form_
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-48
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-54
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-57
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-59
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-61
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-64
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://promisesaplus.com/#point-75
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://secure-excel-file.glitch.me/
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://secure-excel-file.glitch.me/.Sign
Source: ~DF393BF7B86FA4A2BC.TMP.2.dr String found in binary or memory: https://secure-excel-file.glitch.me/ed
Source: {7E9128FA-3101-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://secure-excel-fl.O365.securefilep
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://secure.aadcdn.microsoftonline-p.com/ests/2.1.8576.13/content/images/microsoft_logo_ee5c8d9fb
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://sizzlejs.com/
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://web.archive.org/web/20100324014747/http://blindsignals.com/index.php/2009/07/jquery-delay/
Source: jquery-3.3.1[1].js.3.dr String found in binary or memory: https://web.archive.org/web/20141116233347/http://fluidproject.org/blog/2008/01/09/getting-setting-a
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://www.ilo.org/actemp/publications/WCMS_740375/lang--en/index.htm
Source: 07D9KDVU.htm.3.dr String found in binary or memory: https://www.office.com/?auth=2
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49166
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49165
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49180
Source: unknown Network traffic detected: HTTP traffic on port 49207 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49206 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49166 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49191 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49178 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49212 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49213
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49212
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49178
Source: unknown Network traffic detected: HTTP traffic on port 49180 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49165 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49175
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49192
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49191
Source: unknown Network traffic detected: HTTP traffic on port 49175 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49192 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49213 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49207
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49206
Source: classification engine Classification label: mal60.phis.winXLSX@4/67@12/7
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$Direct Deposit.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRD577.tmp Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1748 CREDAT:275457 /prefetch:2
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1748 CREDAT:275457 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: Direct Deposit.xlsx Initial sample: OLE zip file path = xl/media/image1.png
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 323781 Sample: Direct Deposit.xlsx Startdate: 27/11/2020 Architecture: WINDOWS Score: 60 17 linktr.ee 2->17 25 Antivirus detection for URL or domain 2->25 27 Yara detected HtmlPhish_10 2->27 29 Phishing site detected (based on logo template match) 2->29 7 iexplore.exe 7 38 2->7         started        9 EXCEL.EXE 57 13 2->9         started        signatures3 process4 process5 11 iexplore.exe 2 74 7->11         started        dnsIp6 19 ibuykenya.com 50.87.153.159, 49200, 49201, 80 UNIFIEDLAYER-AS-1US United States 11->19 21 i.ibb.co 145.239.131.55, 443, 49212, 49213 OVHFR France 11->21 23 10 other IPs or domains 11->23 15 C:\Users\user\AppData\Local\...\07D9KDVU.htm, HTML 11->15 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
151.101.130.133
unknown United States
54113 FASTLYUS false
172.217.168.2
unknown United States
15169 GOOGLEUS false
143.204.214.108
unknown United States
16509 AMAZON-02US false
50.87.153.159
unknown United States
46606 UNIFIEDLAYER-AS-1US false
52.205.236.122
unknown United States
14618 AMAZON-AESUS false
104.16.19.94
unknown United States
13335 CLOUDFLARENETUS false
145.239.131.55
unknown France
16276 OVHFR false

Contacted Domains

Name IP Active
linktr.ee 151.101.130.133 true
ibuykenya.com 50.87.153.159 true
secure-excel-file.glitch.me 52.205.236.122 true
pagead.l.doubleclick.net 172.217.168.2 true
cdnjs.cloudflare.com 104.16.19.94 true
d1fdloi71mui9q.cloudfront.net 143.204.214.108 true
i.ibb.co 145.239.131.55 true
secure.aadcdn.microsoftonline-p.com unknown unknown
ka-f.fontawesome.com unknown unknown
code.jquery.com unknown unknown
kit.fontawesome.com unknown unknown
maxcdn.bootstrapcdn.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://ibuykenya.com/vendor/doctrine/styles.css false
  • Avira URL Cloud: safe
unknown
https://secure-excel-file.glitch.me/ false high
https://linktr.ee/excel.O365.securefile false
    high