URL: https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
Submission: On December 18 via manual from US

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is 198.54.116.178, located in Los Angeles, United States and belongs to NAMECHEAP-NET - Namecheap, Inc., US. The main domain is mystroo.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on February 20th 2019. Valid for: a year.
This is the only time mystroo.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Sharepoint (Online)

Domain & IP information

IP Address AS Autonomous System
1 198.54.116.178 22612 (NAMECHEAP...)
1 23.253.180.149 19994 (RACKSPACE)
1 2606:2800:233... 15133 (EDGECAST)
3 3
Domain Requested by
1 cdn.sharepointeurope.com mystroo.com
1 www.fresnostate.edu mystroo.com
1 mystroo.com
3 3

This site contains no links.

Subject Issuer Validity Valid
mystroo.com
Sectigo RSA Domain Validation Secure Server CA
2019-02-20 -
2020-02-20
a year crt.sh
snid1c7gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-10-09 -
2020-10-13
2 years crt.sh

This page contains 1 frames:

Primary Page: https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
Frame ID: 4ABFE14F21FB44152C30C108CFBC05ED
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

67 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

24 kB
Transfer

26 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/
5 KB
2 KB
Document
General
Full URL
https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
198.54.116.178 Los Angeles, United States, ASN22612 (NAMECHEAP-NET - Namecheap, Inc., US),
Reverse DNS
server232-5.web-hosting.com
Software
Apache / PHP/5.6.40
Resource Hash
363df0881ffdccd8f9b9b7c924c176346b6512af8b58c945e94d6b34ba4fd1c1

Request headers

:method
GET
:authority
mystroo.com
:scheme
https
:path
/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
date
Wed, 18 Dec 2019 18:02:29 GMT
server
Apache
x-powered-by
PHP/5.6.40
vary
Accept-Encoding
content-encoding
gzip
content-length
2033
content-type
text/html; charset=UTF-8
goog%20docs.png
www.fresnostate.edu/president/discovere/images/improvedlogos/
9 KB
9 KB
Image
General
Full URL
http://www.fresnostate.edu/president/discovere/images/improvedlogos/goog%20docs.png
Requested by
Host: mystroo.com
URL: https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
Protocol
HTTP/1.1
Server
23.253.180.149 San Antonio, United States, ASN19994 (RACKSPACE - Rackspace Hosting, US),
Reverse DNS
Software
/
Resource Hash
5757e602c5502496be5d7ec17d19cd1d97dc216497dfc6a7654f2b6396e546f4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 18 Dec 2019 18:02:29 GMT
Last-Modified
Tue, 10 Jan 2017 20:35:29 GMT
Age
0
ETag
"225f-545c36ccd5996"
X-Varnish
37463065
Cache-Control
max-age=120
X-Cache-Info
caching
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/png
Content-Length
8799
Expires
Wed, 18 Dec 2019 18:04:29 GMT
SharePoint-logo.png
cdn.sharepointeurope.com/wp-content/uploads/2011/12/
13 KB
13 KB
Image
General
Full URL
https://cdn.sharepointeurope.com/wp-content/uploads/2011/12/SharePoint-logo.png
Requested by
Host: mystroo.com
URL: https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:1cb7:261b:1f9c:2074:3c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F05) /
Resource Hash
7f672d39017602a1ef5b484477bb7743904515691c3a0242993934d1dd833ece

Request headers

Referer
https://mystroo.com/Pay/paymentdatabase/sharepoint/payment/owa/index.php?email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 18 Dec 2019 18:02:29 GMT
last-modified
Wed, 07 Aug 2019 19:47:11 GMT
server
ECAcc (frc/8F05)
access-control-allow-origin
*
etag
"5d4b2abf-335d"
x-cache
HIT
content-type
image/png
status
200
cache-control
max-age=5184000
accept-ranges
bytes
content-length
13149
expires
Sun, 16 Feb 2020 18:02:29 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Sharepoint (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| modal

0 Cookies