Report Overview

  1. Visited public
    2024-10-13 02:48:05
    Tags
  2. URL

    www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/

  3. Finishing URL

    www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/

  4. IP / ASN
    172.67.71.52

    #13335 CLOUDFLARENET

    Title
    Suspected APT29 Operation Launches Election Fraud Themed Phishing Campaigns | Volexity
Detections
urlquery
0
Network Intrusion Detection
0
Threat Detection Systems
4

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
o.pki.googunknown2016-06-132024-04-242024-10-13
www.volexity.comunknown2013-07-292014-09-252024-06-18
www.googletagmanager.com752011-11-112013-05-222024-10-13
fonts.googleapis.com88772005-01-252013-06-102024-10-13
fonts.gstatic.comunknown2008-02-112014-09-092024-10-13
static.cloudflareinsights.com12942019-08-302019-09-242024-10-13

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumwww.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/A loader for the CobaltStrike malware family, which ultimately takes the first and second bytes of an embedded file, and flips them prior to executing the resulting payload.
mediumwww.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/The FRESHFIRE malware family. The malware acts as a downloader, pulling down an encrypted snippet of code from a remote source, executing it, and deleting it from the remote server.

OpenPhish

No alerts detected


PhishTank

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


JavaScript (11)

HTTP Transactions (32)

URLIPResponseSize
o.pki.goog/wr2
142.250.74.131 472 B
www.volexity.com/wp-includes/css/dist/block-library/style.min.css?ver=6.6.2
172.67.71.52200 OK15 kB
www.volexity.com/wp-content/themes/volexity/dist/images/logo.png
172.67.71.52200 OK4.9 kB
www.volexity.com/wp-content/plugins/cookie-notice/css/front.min.css?ver=2.4.18
172.67.71.52200 OK1.1 kB
www.volexity.com/wp-content/themes/volexity/dist/styles/styles.min.css?ver=6.6.2
172.67.71.52200 OK18 kB
www.volexity.com/wp-content/uploads/2021/05/image002.png
172.67.71.52200 OK568 kB
www.volexity.com/wp-content/uploads/2021/05/election-fraud-blog-post-header-image-1-1536x768.png
172.67.71.52200 OK174 kB
www.googletagmanager.com/gtag/js?id=G-WRSX85NK29
142.250.74.40200 OK94 kB
o.pki.goog/wr2
142.250.74.131 472 B
www.volexity.com/wp-content/plugins/cookie-notice/js/front.min.js?ver=2.4.18
172.67.71.52200 OK2.6 kB
www.volexity.com/wp-content/uploads/2021/05/phish_email-1024x817.png
172.67.71.52200 OK358 kB
www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/
172.67.71.52200 OK18 kB
o.pki.goog/wr2
142.250.74.131 471 B
o.pki.goog/wr2
142.250.74.131 471 B
fonts.googleapis.com/css?family=Source+Sans+Pro:300,400,400i,500,700,700i|Roboto+Condensed:400,500|Roboto:400,300,500|Roboto+Slab:300,500,400|Open+Sans:400,600,700
142.250.74.106200 OK51 kB
www.volexity.com/wp-includes/js/jquery/jquery.min.js?ver=3.7.1
172.67.71.52200 OK80 kB
www.volexity.com/wp-content/themes/volexity/dist/images/search.png
172.67.71.52200 OK309 B
www.volexity.com/wp-content/themes/volexity/fonts/icons.woff2?4053275
172.67.71.52200 OK5.1 kB
fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
216.58.207.227200 OK48 kB
o.pki.goog/wr2
142.250.74.131 471 B
www.volexity.com/wp-content/themes/volexity/fonts/fa-brands-400.woff2
172.67.71.52200 OK108 kB
www.volexity.com/cdn-cgi/rum?
172.67.71.52204 No Content0 B
fonts.gstatic.com/s/roboto/v32/KFOmCnqEu92Fr1Mu4mxK.woff2
216.58.207.227200 OK18 kB
www.volexity.com/wp-content/themes/volexity/apple-touch-icon.png
172.67.71.52200 OK21 kB
www.volexity.com/wp-content/themes/volexity/favicon-16x16.png
172.67.71.52200 OK830 B
www.volexity.com/wp-content/themes/volexity/dist/scripts/scripts.min.js?ver=6.6.2
172.67.71.52200 OK174 kB
static.cloudflareinsights.com/beacon.min.js/vcd15cbe7772f49c399c6a5babf22c1241717689176015
104.16.80.73200 OK20 kB
www.volexity.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1
172.67.71.52200 OK14 kB
www.volexity.com/wp-content/themes/volexity/dist/images/header-bg/Banner_5_L-01.svg
172.67.71.52200 OK696 B
www.volexity.com/wp-content/themes/volexity/dist/images/header-bg/Banner_5_R-02.svg
172.67.71.52200 OK1.2 kB
www.volexity.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
172.67.71.52200 OK1.2 kB
www.volexity.com/wp-includes/js/comment-reply.min.js?ver=6.6.2
172.67.71.52200 OK3.0 kB