outlookloffice365useracgm8o1f.web.app
Open in
urlscan Pro
151.101.1.195
Malicious Activity!
Public Scan
Effective URL: https://outlookloffice365useracgm8o1f.web.app/86d744e367ac6a47aa4f51c91b3b6dc0d41d8cd98f00b204e9800998ecf8427e
Submission: On August 05 via manual from IN
Summary
TLS certificate: Issued by GTS CA 1O1 on February 19th 2019. Valid for: a year.
This is the only time outlookloffice365useracgm8o1f.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:26f0:6c0... 2a02:26f0:6c00::210:ba09 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 2 | 23.101.120.195 23.101.120.195 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
1 | 151.101.1.195 151.101.1.195 | 54113 (FASTLY) (FASTLY - Fastly) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:2bf::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
4 | 3 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
34edrtfvg.azurewebsites.net |
ASN54113 (FASTLY - Fastly, US)
outlookloffice365useracgm8o1f.web.app |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
2 KB |
2 |
azurewebsites.net
2 redirects
34edrtfvg.azurewebsites.net |
1 KB |
1 |
web.app
outlookloffice365useracgm8o1f.web.app |
28 KB |
1 |
azureedge.net
1 redirects
t4e6d.azureedge.net |
668 B |
0 |
jquery.com
Failed
code.jquery.com Failed |
|
4 | 5 |
Domain | Requested by | |
---|---|---|
2 | secure.aadcdn.microsoftonline-p.com |
outlookloffice365useracgm8o1f.web.app
|
2 | 34edrtfvg.azurewebsites.net | 2 redirects |
1 | outlookloffice365useracgm8o1f.web.app | |
1 | t4e6d.azureedge.net | 1 redirects |
0 | code.jquery.com Failed |
outlookloffice365useracgm8o1f.web.app
|
4 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app GTS CA 1O1 |
2019-02-19 - 2020-02-18 |
a year | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 4 |
2019-07-17 - 2021-07-17 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://outlookloffice365useracgm8o1f.web.app/86d744e367ac6a47aa4f51c91b3b6dc0d41d8cd98f00b204e9800998ecf8427e
Frame ID: 1856323F46655E09BE092DA3B3D10533
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://t4e6d.azureedge.net/479GZD7?dyu=cmF5LnNpbGNvY2tAcGVycmlnby5jb20=&perrigo.comray.silcock@perrigo....
HTTP 301
https://34edrtfvg.azurewebsites.net/olom?em=cmF5LnNpbGNvY2tAcGVycmlnby5jb20&title=479GZD&dyu=cmF5LnNpbGNvY2t... HTTP 301
https://34edrtfvg.azurewebsites.net/olom/?em=cmF5LnNpbGNvY2tAcGVycmlnby5jb20&title=479GZD&dyu=cmF5LnNpbGNvY2... HTTP 302
https://outlookloffice365useracgm8o1f.web.app/86d744e367ac6a47aa4f51c91b3b6dc0d41d8cd98f00b204e9800998ecf8427e Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://t4e6d.azureedge.net/479GZD7?dyu=cmF5LnNpbGNvY2tAcGVycmlnby5jb20=&perrigo.comray.silcock@perrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcock&cmF5LnNpbGNvY2tAcGVycmlnby5jb20=
HTTP 301
https://34edrtfvg.azurewebsites.net/olom?em=cmF5LnNpbGNvY2tAcGVycmlnby5jb20&title=479GZD&dyu=cmF5LnNpbGNvY2tAcGVycmlnby5jb20=&perrigo.comray.silcock@perrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcock&cmF5LnNpbGNvY2tAcGVycmlnby5jb20= HTTP 301
https://34edrtfvg.azurewebsites.net/olom/?em=cmF5LnNpbGNvY2tAcGVycmlnby5jb20&title=479GZD&dyu=cmF5LnNpbGNvY2tAcGVycmlnby5jb20=&perrigo.comray.silcock@perrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcockperrigo.comray%20silcockperrigo.comcmF5LnNpbGNvY2tAcGVycmlnby5jb20=&ray%20silcock&cmF5LnNpbGNvY2tAcGVycmlnby5jb20= HTTP 302
https://outlookloffice365useracgm8o1f.web.app/86d744e367ac6a47aa4f51c91b3b6dc0d41d8cd98f00b204e9800998ecf8427e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
86d744e367ac6a47aa4f51c91b3b6dc0d41d8cd98f00b204e9800998ecf8427e
outlookloffice365useracgm8o1f.web.app/ Redirect Chain
|
226 KB 28 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.4.1.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8148.16/content/images/ |
915 B 640 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- code.jquery.com
- URL
- https://code.jquery.com/jquery-3.4.1.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
34edrtfvg.azurewebsites.net
code.jquery.com
outlookloffice365useracgm8o1f.web.app
secure.aadcdn.microsoftonline-p.com
t4e6d.azureedge.net
code.jquery.com
151.101.1.195
23.101.120.195
2a02:26f0:6c00:2bf::35c1
2a02:26f0:6c00::210:ba09
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
605ecc6091b78d2b61e3cc43157094c6553d6ef401d070ce98c916eff228ef3b
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea