froombosch.top
Open in
urlscan Pro
2606:4700:30::6812:3071
Malicious Activity!
Public Scan
Submission: On December 03 via manual from CZ
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 3rd 2019. Valid for: 10 months.
This is the only time froombosch.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:30:... 2606:4700:30::6812:3071 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
8 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST - MCI Communications Services) | |
9 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
froombosch.top |
ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
msftauth.net
aadcdn.msftauth.net |
385 KB |
1 |
froombosch.top
froombosch.top |
5 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | aadcdn.msftauth.net |
froombosch.top
|
1 | froombosch.top | |
9 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-12-03 - 2020-10-09 |
10 months | crt.sh |
aadcdn.msftauth.net Microsoft IT TLS CA 5 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://froombosch.top/Office365/oauth.php
Frame ID: 92CAC171B2C5360CAF4EF5C7C00725DC
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
oauth.php
froombosch.top/Office365/ |
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_mbqre5pw01euigudkiymsa2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
99 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.kmsi.core.min_91y_my7t9phiagocbdt0vq2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
273 KB 78 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.kmsi.strings-en-gb.min_2-3tfl3ngs-qm8sbvnxmzg2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
13 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 407 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 405 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| webpackJsonp object| StringRepository object| PROOF boolean| __2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
froombosch.top/ | Name: PHPSESSID Value: feea659a849775384eb996b4e5935269 |
|
.froombosch.top/ | Name: __cfduid Value: d8059cf5e30be8a3ef3e670ce4b33333b1575382391 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
froombosch.top
152.199.23.37
2606:4700:30::6812:3071
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
23a395d78b3d7fefad02780c0bb379a7513a63f134d8a227ddbf3bd0f5cacca8
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
6813d1d91cbf34ad0b41317a65536fc8b17e66c8192b41e5e7eff4eec5963453
ea073d6416a1c80db854b3d255c4984331bb66512a8357a48c1a1f61a0c5258a
ee2731f0e2ff099c993dbcc97a303ad0aba5ba6a8914c15d11c2581dbabb25a0
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea