login.outlook.zengzhelingasdfcxz.top
Open in
urlscan Pro
173.199.70.168
Malicious Activity!
Public Scan
Effective URL: https://login.outlook.zengzhelingasdfcxz.top/login.srf?wa=wsignin1.0&rpsnv=13&ct=1548403300&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2fo...
Submission: On January 25 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on January 25th 2019. Valid for: 3 months.
This is the only time login.outlook.zengzhelingasdfcxz.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 173.199.70.168 173.199.70.168 | 20473 (AS-CHOOPA) (AS-CHOOPA - Choopa) | |
4 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 2a02:26f0:6c0... 2a02:26f0:6c00:29f::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2603:1026:401... 2603:1026:401:16::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
12 | 4 |
ASN20473 (AS-CHOOPA - Choopa, LLC, US)
PTR: 173.199.70.168.vultr.com
login.outlook.zengzhelingasdfcxz.top | |
outlook.outlook.zengzhelingasdfcxz.top |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
outlook.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
gfx.ms
auth.gfx.ms |
437 KB |
3 |
zengzhelingasdfcxz.top
2 redirects
login.outlook.zengzhelingasdfcxz.top outlook.outlook.zengzhelingasdfcxz.top |
29 KB |
1 |
office365.com
outlook.office365.com |
|
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | auth.gfx.ms |
login.outlook.zengzhelingasdfcxz.top
auth.gfx.ms |
2 | login.outlook.zengzhelingasdfcxz.top | 1 redirects |
1 | outlook.office365.com |
auth.gfx.ms
|
1 | outlook.outlook.zengzhelingasdfcxz.top | 1 redirects |
12 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
account.outlook.zengzhelingasdfcxz.top |
Subject Issuer | Validity | Valid | |
---|---|---|---|
outlook.outlook.zengzhelingasdfcxz.top Let's Encrypt Authority X3 |
2019-01-25 - 2019-04-25 |
3 months | crt.sh |
msagfx.live.com Microsoft IT TLS CA 4 |
2017-07-27 - 2019-07-17 |
2 years | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2018-08-01 - 2020-08-01 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://login.outlook.zengzhelingasdfcxz.top/login.srf?wa=wsignin1.0&rpsnv=13&ct=1548403300&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3db66f0bf1-7bbb-b6fe-2c7e-c89a2301c5b6&id=292841&aadredir=1&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015
Frame ID: 72684026ACA416BF8B2D0666B1ADE293
Requests: 11 HTTP requests in this frame
Frame:
https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Frame ID: 2790C0E828BE7DD2D6260E7F98128E0B
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://login.outlook.zengzhelingasdfcxz.top/
HTTP 302
https://outlook.outlook.zengzhelingasdfcxz.top/owa/?nlp=1 HTTP 302
https://login.outlook.zengzhelingasdfcxz.top/login.srf?wa=wsignin1.0&rpsnv=13&ct=1548403300&rver=7.0.6737.0&wp=MBI_SSL&wr... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /IIS(?:\/([\d.]+))?/i
Knockout.js (JavaScript Frameworks) Expand
Detected patterns
- env /^ko$/i
webpack (Miscellaneous) Expand
Detected patterns
- env /^webpackJsonp$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Forgot username
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://login.outlook.zengzhelingasdfcxz.top/
HTTP 302
https://outlook.outlook.zengzhelingasdfcxz.top/owa/?nlp=1 HTTP 302
https://login.outlook.zengzhelingasdfcxz.top/login.srf?wa=wsignin1.0&rpsnv=13&ct=1548403300&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3db66f0bf1-7bbb-b6fe-2c7e-c89a2301c5b6&id=292841&aadredir=1&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.srf
login.outlook.zengzhelingasdfcxz.top/ Redirect Chain
|
25 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged_v21033.css
auth.gfx.ms/16.000.28057.1/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ConvergedLoginPaginatedStrings.EN.js
auth.gfx.ms/16.000.28057.1/ |
21 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OldConvergedLogin_PCore.js
auth.gfx.ms/16.000.28057.1/ |
467 KB 124 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OldConvergedLogin_PAlt.js
auth.gfx.ms/16.000.28057.1/ |
12 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.28057.1/images/Backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.28057.1/images/Backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
prefetch.aspx
outlook.office365.com/owa/ Frame 2790 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
info.svg
auth.gfx.ms/16.000.28057.1/images/ |
342 B 611 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
auth.gfx.ms/16.000.28057.1/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
auth.gfx.ms/16.000.28057.1/images/ |
915 B 667 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
auth.gfx.ms/16.000.28057.1/images/ |
915 B 667 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| PROOF object| $Do function| $Loader object| g_dtFirstByte object| g_objPageMode number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| ServerData object| HIP object| StringRepository boolean| __ConvergedLoginPaginatedStrings function| webpackJsonp object| ko boolean| __OldConvergedLogin_PCore boolean| __OldConvergedLogin_PAlt function| WhenAllLoaded4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
login.outlook.zengzhelingasdfcxz.top/ | Name: CkTst Value: G1548403306240 |
|
.login.outlook.zengzhelingasdfcxz.top/ | Name: MSPOK Value: $uuid-c0517c2a-a413-44ed-ae62-809d479cfcf7 |
|
login.outlook.zengzhelingasdfcxz.top/ | Name: MSPRequ Value: lt=1548403306&co=1&id=292841 |
|
.login.outlook.zengzhelingasdfcxz.top/ | Name: uaid Value: bcd250683a8e4a30a7291b74c9909ad3 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
login.outlook.zengzhelingasdfcxz.top
outlook.office365.com
outlook.outlook.zengzhelingasdfcxz.top
173.199.70.168
2603:1026:401:16::2
2a02:26f0:6c00:283::34ef
2a02:26f0:6c00:29f::34ef
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0ce2939bac40d1906032df28fd682695c2cc145ddd38341372e2e71764ba5552
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
30bca0d7559731c8713a0909242226f4899f56af761f93ba286f4211c9e2d60f
51652f1ff80c0fe6ca5f906b5ca1a5b6eaa3b0c76cc924e97f9d7bcc60a2e6bb
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
7e2b63ef07233576f76178a21659800dc7f5e33d8ff0aeb5399237acb1be6e9c
ab4cf0d8fd2303cf9b9ba99b8fcd55f7e40a7e9ff85f62a8edbed261234000f5
f3368544a6266f0fee3c4437a8144887bbad1de97be20a578c07946a8ed41b4f
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea