Analysis Report https://es.sonicurlprotection-sjl.com/click?PV=1&MSGID=202105211549092505692&URLID=1&ESV=10.0.9.5707&IV=E883A8665494D69666E51654A2A39188&TT=1621612156493&ESN=z1jnIrTVkkYn09KxCUei6Eq2cavioNPQClHgLUOR8BA%3D&KV=1536961729279&ENCODED_URL=http%3A%2F%2Feviromentalachforcovid.org%2F&HK=E4B2C7C59B7CB793F04CB2C26C1B812F608F409CE43CADC4C3A0B63CE2F36A29

Overview

General Information

Sample URL: https://es.sonicurlprotection-sjl.com/click?PV=1&MSGID=202105211549092505692&URLID=1&ESV=10.0.9.5707&IV=E883A8665494D69666E51654A2A39188&TT=1621612156493&ESN=z1jnIrTVkkYn09KxCUei6Eq2cavioNPQClHgLUOR8BA%3D&KV=1536961729279&ENCODED_URL=http%3A%2F%2Feviromentalachforcovid.org%2F&HK=E4B2C7C59B7CB793F04CB2C26C1B812F608F409CE43CADC4C3A0B63CE2F36A29
Analysis ID: 419819
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Yara detected HtmlPhish10
Yara detected obfuscated html page
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid 'forgot password' link found

Classification

AV Detection:

barindex
Antivirus detection for URL or domain
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html SlashNext: Label: Fake Login Page type: Phishing & Social Engineering

Phishing:

barindex
Yara detected HtmlPhish10
Source: Yara match File source: 642294.0.links.csv, type: HTML
Yara detected obfuscated html page
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\______portlander_iwcbew29763869929_92727297_nunueun[1].htm, type: DROPPED
Phishing site detected (based on logo template match)
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html Matcher: Template: microsoft matched
HTML body contains low number of good links
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Number of links: 0
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Number of links: 0
HTML title does not match URL
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Title: Sign in to your Microsoft account does not match URL
Invalid 'forgot password' link found
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Invalid link: Forgot my password
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: Invalid link: Forgot my password
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: No <meta name="author".. found
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: No <meta name="author".. found
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: No <meta name="copyright".. found
Source: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Source: unknown HTTPS traffic detected: 4.16.47.153:443 -> 192.168.2.7:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 4.16.47.153:443 -> 192.168.2.7:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.11.37.142:443 -> 192.168.2.7:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.11.37.142:443 -> 192.168.2.7:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.7:49761 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.7:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49766 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.7:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.7:49768 version: TLS 1.2
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: eviromentalachforcovid.org
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.eviromentalachforcovid.org
Source: unknown DNS traffic detected: queries for: es.sonicurlprotection-sjl.com
Source: plugins[1].js.3.dr String found in binary or memory: http://blog.alexmaccaw.com/css-transitions
Source: font-awesome[1].css.3.dr String found in binary or memory: http://fontawesome.io
Source: font-awesome[1].css.3.dr String found in binary or memory: http://fontawesome.io/license
Source: plugins[1].js.3.dr String found in binary or memory: http://getbootstrap.com/javascript/#carousel
Source: plugins[1].js.3.dr String found in binary or memory: http://getbootstrap.com/javascript/#transitions
Source: plugins[1].js.3.dr String found in binary or memory: http://hammerjs.github.io/
Source: 53JLL48S.htm.3.dr String found in binary or memory: http://www.eviromentalachforcovid.org/
Source: ga[1].js.3.dr String found in binary or memory: http://www.google-analytics.com
Source: plugins[1].js.3.dr String found in binary or memory: http://www.modernizr.com/)
Source: imagestore.dat.3.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
Source: imagestore.dat.3.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~
Source: imagestore.dat.3.dr String found in binary or memory: https://aadcdn.msftauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico~(
Source: PIY6B33K.htm.3.dr String found in binary or memory: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Source: css[1].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/cookie/v12/syky-y18lb0tSbf9kgqU.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6u8w4BMUTPHjxsAUi-s.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh6UVSwaPHw.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh7USSwaPHw.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6u_w4BMUTPHjxsI5wq_FQfr.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6u_w4BMUTPHjxsI9w2_FQfr.woff)
Source: css[2].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjxAwWA.woff)
Source: css[1].css0.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lora/v17/0QI6MX1D_JOuGQbT0gvTJPa787weuxJPkqs.woff)
Source: css[1].css0.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lora/v17/0QI6MX1D_JOuGQbT0gvTJPa787z5vBJPkqs.woff)
Source: css[1].css0.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lora/v17/0QI8MX1D_JOuMw_hLdO6T2wV9KnW-C0CoqF2mg.woff)
Source: css[1].css0.3.dr String found in binary or memory: https://fonts.gstatic.com/s/lora/v17/0QI8MX1D_JOuMw_hLdO6T2wV9KnW-MoFoqF2mg.woff)
Source: css[3].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/montserrat/v15/JTURjIg1_i6t8kCHKm45_dJE3gfD-A.woff)
Source: css[3].css.3.dr String found in binary or memory: https://fonts.gstatic.com/s/montserrat/v15/JTUSjIg1_i6t8kCHKm459WdhzQ.woff)
Source: plugins[1].js.3.dr String found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: ga[1].js.3.dr String found in binary or memory: https://ssl.google-analytics.com
Source: ga[1].js.3.dr String found in binary or memory: https://ssl.google-analytics.com/j/__utm.gif
Source: ga[1].js.3.dr String found in binary or memory: https://stats.g.doubleclick.net/j/collect?
Source: plugins[1].js.3.dr String found in binary or memory: https://twitter.com/jacobrossi/status/480596438489890816
Source: ~DF133F3DCA620240FD.TMP.2.dr String found in binary or memory: https://www.eviromentalachforcovid.org/
Source: www.eviromentalachforcovid[1].xml.3.dr String found in binary or memory: https://www.eviromentalachforcovid.org/&quot;
Source: {A615E001-BA9A-11EB-90E6-ECF4BB82F7E0}.dat.2.dr String found in binary or memory: https://www.eviromentalachforcovid.org/Root
Source: imagestore.dat.3.dr String found in binary or memory: https://www.eviromentalachforcovid.org/favicon.ico
Source: ~DF133F3DCA620240FD.TMP.2.dr String found in binary or memory: https://www.eviromentalachforcovid.org/p
Source: PIY6B33K.htm.3.dr String found in binary or memory: https://www.eviromentalachforcovid.org/uploads/1/3/7/7/137716034/editor/po99839393-converted-1.jpg?1
Source: ga[1].js.3.dr String found in binary or memory: https://www.google.%/ads/ga-audiences?
Source: ga[1].js.3.dr String found in binary or memory: https://www.google.com/analytics/web/inpage/pub/inpage.js?
Source: PIY6B33K.htm.3.dr String found in binary or memory: https://www.google.com/recaptcha/api.js
Source: ~DF133F3DCA620240FD.TMP.2.dr String found in binary or memory: https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______po
Source: {A615E001-BA9A-11EB-90E6-ECF4BB82F7E0}.dat.2.dr String found in binary or memory: https://www0utl00koffilachforcovid.org/p
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49766 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49766
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49764
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49764 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown HTTPS traffic detected: 4.16.47.153:443 -> 192.168.2.7:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 4.16.47.153:443 -> 192.168.2.7:49712 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49721 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49729 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49730 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49731 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49734 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49732 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.1.46:443 -> 192.168.2.7:49728 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49723 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49726 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49727 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49733 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.11.37.142:443 -> 192.168.2.7:49749 version: TLS 1.2
Source: unknown HTTPS traffic detected: 52.11.37.142:443 -> 192.168.2.7:49748 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.34.228.73:443 -> 192.168.2.7:49758 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.7:49761 version: TLS 1.2
Source: unknown HTTPS traffic detected: 104.16.18.94:443 -> 192.168.2.7:49762 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49766 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49763 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49764 version: TLS 1.2
Source: unknown HTTPS traffic detected: 152.199.23.37:443 -> 192.168.2.7:49765 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.7:49767 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.229.221.185:443 -> 192.168.2.7:49768 version: TLS 1.2
Source: classification engine Classification label: mal68.phis.win@3/52@11/8
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A615DFFF-BA9A-11EB-90E6-ECF4BB82F7E0}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user~1\AppData\Local\Temp\~DF80F2FF650A7D1B50.TMP Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5424 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5424 CREDAT:17410 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 419819 URL: https://es.sonicurlprotecti... Startdate: 21/05/2021 Architecture: WINDOWS Score: 68 15 www.eviromentalachforcovid.org 2->15 17 prda.aadg.msidentity.com 2->17 25 Antivirus detection for URL or domain 2->25 27 Yara detected HtmlPhish10 2->27 29 Yara detected obfuscated html page 2->29 31 Phishing site detected (based on logo template match) 2->31 7 iexplore.exe 1 52 2->7         started        signatures3 process4 process5 9 iexplore.exe 5 85 7->9         started        dnsIp6 19 eviromentalachforcovid.org 199.34.228.73, 443, 49716, 49717 WEEBLYUS United States 9->19 21 es.sonicurlprotection-sjl.com 4.16.47.153, 443, 49712, 49713 LEVEL3US United States 9->21 23 13 other IPs or domains 9->23 13 ______portlander_i...7297_nunueun[1].htm, HTML 9->13 dropped file7
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
4.16.47.153
es.sonicurlprotection-sjl.com United States
3356 LEVEL3US false
199.34.228.73
www.eviromentalachforcovid.org United States
27647 WEEBLYUS false
151.101.1.46
weebly.map.fastly.net United States
54113 FASTLYUS false
163.68.118.49
s3.jp-osa.cloud-object-storage.appdomain.cloud France
17816 CHINA169-GZChinaUnicomIPnetworkChina169Guangdongprovi false
192.229.221.185
cs1227.wpc.alphacdn.net United States
15133 EDGECASTUS false
52.11.37.142
sp-2020021412301152490000000a-1069308460.us-west-2.elb.amazonaws.com United States
16509 AMAZON-02US false
152.199.23.37
cs1100.wpc.omegacdn.net United States
15133 EDGECASTUS false
104.16.18.94
cdnjs.cloudflare.com United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
www.eviromentalachforcovid.org 199.34.228.73 true
cs1100.wpc.omegacdn.net 152.199.23.37 true
eviromentalachforcovid.org 199.34.228.73 true
sp-2020021412301152490000000a-1069308460.us-west-2.elb.amazonaws.com 52.11.37.142 true
cdnjs.cloudflare.com 104.16.18.94 true
weebly.map.fastly.net 151.101.1.46 true
cs1227.wpc.alphacdn.net 192.229.221.185 true
s3.jp-osa.cloud-object-storage.appdomain.cloud 163.68.118.49 true
es.sonicurlprotection-sjl.com 4.16.47.153 true
logincdn.msauth.net unknown unknown
ec.editmysite.com unknown unknown
code.jquery.com unknown unknown
cdn2.editmysite.com unknown unknown
aadcdn.msftauth.net unknown unknown
www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://eviromentalachforcovid.org/ false
  • Avira URL Cloud: safe
unknown
https://www.eviromentalachforcovid.org/ true
    unknown
    http://www.eviromentalachforcovid.org/ false
    • Avira URL Cloud: safe
    unknown
    https://www0utl00koffice365comcginewloginapp.s3.jp-osa.cloud-object-storage.appdomain.cloud/______portlander_iwcbew29763869929_92727297_nunueun.html true
    • SlashNext: Fake Login Page type: Phishing & Social Engineering
    unknown