office-messagequota.com
Open in
urlscan Pro
108.170.51.58
Malicious Activity!
Public Scan
Effective URL: https://office-messagequota.com/quota/incoming/login.php?cmd=login_submit&id=74f8da047a25ad27bf1322d86a77d64074f8da047a25ad27bf1...
Submission: On July 03 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 2nd 2018. Valid for: 3 months.
This is the only time office-messagequota.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 10 | 108.170.51.58 108.170.51.58 | 20454 (SSASN2) (SSASN2 - SECURED SERVERS LLC) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 2 |
ASN20454 (SSASN2 - SECURED SERVERS LLC, US)
PTR: terminal1.veeblehosting.com
office-messagequota.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
office-messagequota.com
2 redirects
office-messagequota.com |
586 KB |
1 |
gfx.ms
auth.gfx.ms |
666 B |
9 | 2 |
Domain | Requested by | |
---|---|---|
10 | office-messagequota.com |
2 redirects
office-messagequota.com
|
1 | auth.gfx.ms |
office-messagequota.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
office-messagequota.com Let's Encrypt Authority X3 |
2018-07-02 - 2018-09-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://office-messagequota.com/quota/incoming/login.php?cmd=login_submit&id=74f8da047a25ad27bf1322d86a77d64074f8da047a25ad27bf1322d86a77d640&session=74f8da047a25ad27bf1322d86a77d64074f8da047a25ad27bf1322d86a77d640
Frame ID: 46874499AB2C087795C0210242CB2CC8
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign InPage URL History Show full URLs
-
https://office-messagequota.com/quota/incoming
HTTP 301
https://office-messagequota.com/quota/incoming/ HTTP 302
https://office-messagequota.com/quota/incoming/login.php?cmd=login_submit&id=74f8da047a25ad27bf1322d86a77d64... Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://office-messagequota.com/quota/incoming
HTTP 301
https://office-messagequota.com/quota/incoming/ HTTP 302
https://office-messagequota.com/quota/incoming/login.php?cmd=login_submit&id=74f8da047a25ad27bf1322d86a77d64074f8da047a25ad27bf1322d86a77d640&session=74f8da047a25ad27bf1322d86a77d64074f8da047a25ad27bf1322d86a77d640 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
office-messagequota.com/quota/incoming/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
conv.min.css
office-messagequota.com/quota/incoming/css/ |
18 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lofo.png
office-messagequota.com/quota/incoming/images/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m6.png
office-messagequota.com/quota/incoming/images/ |
642 B 683 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m7.png
office-messagequota.com/quota/incoming/images/ |
500 B 540 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
continue.png
office-messagequota.com/quota/incoming/images/ |
603 B 644 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
auth.gfx.ms/16.000.27650.1/images/ |
915 B 666 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
t1.jpg
office-messagequota.com/quota/incoming/images/ |
566 KB 567 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
small.jpg
office-messagequota.com/quota/incoming/images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
office-messagequota.com
108.170.51.58
2a02:26f0:6c00:283::34ef
0b0e8860dc323f2d3431b407330217eaa8ed3a0c022a6949fb0ba9008a5a0cff
15b4ec4a90efb8ab2a35919b12b196e44a46f9c9908cfb93f700280c5b817190
2e8e4169e06c9d9ecadc3713a33290d4d8d69c620edd12f3eaff062b96b0968b
50b31138695b5211ff37efca97f602ced31100535b64898229a7453b27518aa3
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
6689b88e97e5847b5b3442488016e853cd3be24ca14d4a98f52f4990e5e60b29
70c65bd0e084398a87baa298c1fafa52afff402096cb350d563d309565c07e83
7764c38d71f5ee52d39f237f08b4e82b4715c73bfa0afbaee30a60b0dfd058ca
caa1d7d3c14ae4c08df39cbeddd74b35043a8c17b42004a965db51a8e9461183