mosquito-monster.com Open in urlscan Pro
50.87.249.74  Malicious Activity! Public Scan

URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f...
Submission: On July 01 via automatic, source openphish

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 7 HTTP transactions. The main IP is 50.87.249.74, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is mosquito-monster.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 10th 2019. Valid for: 3 months.
This is the only time mosquito-monster.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
5 50.87.249.74 46606 (UNIFIEDLA...)
2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
7 2
Apex Domain
Subdomains
Transfer
5 mosquito-monster.com
mosquito-monster.com
28 KB
2 gfx.ms
auth.gfx.ms
416 B
7 2
Domain Requested by
5 mosquito-monster.com mosquito-monster.com
2 auth.gfx.ms mosquito-monster.com
7 2

This site contains links to these domains. Also see Links.

Domain
account.live.com
login.live.com
Subject Issuer Validity Valid
mosquito-monster.com
Let's Encrypt Authority X3
2019-05-10 -
2019-08-08
3 months crt.sh
msagfx.live.com
Microsoft IT TLS CA 2
2019-06-13 -
2021-06-13
2 years crt.sh

This page contains 2 frames:

Primary Page: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Frame ID: 6F2611249ED46CD3FB996E722A0C7300
Requests: 6 HTTP requests in this frame

Frame: https://mosquito-monster.com/aqstspace/proposal/files/prefetch.html
Frame ID: 6689FECE0D97F0E29F9A1B607132FCB0
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

7
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

29 kB
Transfer

99 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request verification.php
mosquito-monster.com/aqstspace/proposal/
10 KB
4 KB
Document
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
2558ad9f798025d5031e64884415493d46f29d5ffaafac8db7b77fb6ce53dc8b

Request headers

:method
GET
:authority
mosquito-monster.com
:scheme
https
:path
/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx/1.14.1
date
Mon, 01 Jul 2019 22:07:45 GMT
content-type
text/html
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
set-cookie
PHPSESSID=i90cokpc3i5vepsjhfok009iv5; path=/
content-encoding
gzip
Converged1033.css
mosquito-monster.com/aqstspace/proposal/files/
85 KB
20 KB
Stylesheet
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/files/Converged1033.css
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
0df34b37d2d23a2a5056ac368248444c36789c9f71b7e15c13e056b722f335ff

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:45 GMT
content-encoding
gzip
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
content-type
text/css
microsoft_logo.svg
mosquito-monster.com/aqstspace/proposal/files/
4 KB
4 KB
Image
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/files/microsoft_logo.svg
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:45 GMT
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
3651
content-type
image/svg+xml
picker_account_msa.svg
mosquito-monster.com/aqstspace/proposal/files/
379 B
501 B
Image
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/files/picker_account_msa.svg
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
34d8da073f47030ee94b99d84fbe68e3345bd8aaa37ea909ff2da00238447486

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Mon, 01 Jul 2019 22:07:45 GMT
last-modified
Fri, 28 Jun 2019 18:41:13 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
379
content-type
image/svg+xml
prefetch.html
mosquito-monster.com/aqstspace/proposal/files/ Frame 6689
426 B
398 B
Document
General
Full URL
https://mosquito-monster.com/aqstspace/proposal/files/prefetch.html
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
50.87.249.74 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1274.bluehost.com
Software
nginx/1.14.1 /
Resource Hash
1b82ba58c6dccd41f566b9456ca90bc35825555b6e347f90bdcede3a84d68535

Request headers

:method
GET
:authority
mosquito-monster.com
:scheme
https
:path
/aqstspace/proposal/files/prefetch.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
accept-encoding
gzip, deflate, br
cookie
PHPSESSID=i90cokpc3i5vepsjhfok009iv5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd

Response headers

status
404
server
nginx/1.14.1
date
Mon, 01 Jul 2019 22:07:45 GMT
content-type
text/html; charset=iso-8859-1
content-encoding
gzip
0-small.jpg
auth.gfx.ms/16.000.27457.4/images/Backgrounds/
0
208 B
Image
General
Full URL
https://auth.gfx.ms/16.000.27457.4/images/Backgrounds/0-small.jpg?x=12f4b8b543125cc986c79cd85320812f
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:283::34ef , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/8.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 01 Jul 2019 22:07:45 GMT
PPServer
PPV: 30 H: BL2IDSPRTS1A002 V: 0
Connection
keep-alive
Content-Length
0
Server
Microsoft-IIS/8.5
0.jpg
auth.gfx.ms/16.000.27457.4/images/Backgrounds/
0
208 B
Image
General
Full URL
https://auth.gfx.ms/16.000.27457.4/images/Backgrounds/0.jpg?x=f5a9a9531b8f4bcc86eabb19472d15d5
Requested by
Host: mosquito-monster.com
URL: https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:283::34ef , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Microsoft-IIS/8.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://mosquito-monster.com/aqstspace/proposal/verification.php?sf58gfd1s689sxd2sdf8angf264s9df23sd2f1n495K3L2C151645172991f1477dbd26917ef3822423f62e984a91f1477dbd26917ef3822423f62e984a91f1477dbd
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Mon, 01 Jul 2019 22:07:45 GMT
PPServer
PPV: 30 H: BL2IDSPRTS1A003 V: 0
Connection
keep-alive
Content-Length
0
Server
Microsoft-IIS/8.5

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| empty

1 Cookies

Domain/Path Name / Value
mosquito-monster.com/ Name: PHPSESSID
Value: i90cokpc3i5vepsjhfok009iv5