adobedataencrypter.surge.sh
Open in
urlscan Pro
188.166.132.94
Malicious Activity!
Public Scan
Submission: On August 31 via automatic, source openphish
Summary
This is the only time adobedataencrypter.surge.sh was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 188.166.132.94 188.166.132.94 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
4 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2603:1026:100... 2603:1026:100:1a::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
7 | 2a02:26f0:6c0... 2a02:26f0:6c00:2ba::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
13 | 4 |
ASN14061 (DIGITALOCEAN-ASN, US)
adobedataencrypter.surge.sh |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office365.com |
ASN20940 (AKAMAI-ASN1, NL)
r4.res.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
office365.com
outlook.office365.com r4.res.office365.com |
692 KB |
4 |
msauth.net
logincdn.msauth.net |
23 KB |
1 |
surge.sh
adobedataencrypter.surge.sh |
14 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
7 | r4.res.office365.com |
outlook.office365.com
|
4 | logincdn.msauth.net |
adobedataencrypter.surge.sh
|
1 | outlook.office365.com |
adobedataencrypter.surge.sh
|
1 | adobedataencrypter.surge.sh | |
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-05-13 - 2022-05-13 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2020-07-02 - 2022-07-02 |
2 years | crt.sh |
*.res.outlook.com Microsoft RSA TLS CA 02 |
2021-01-20 - 2022-01-20 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
http://adobedataencrypter.surge.sh/
Frame ID: CF072B230D7965D833F4A93FC973FE33
Requests: 5 HTTP requests in this frame
Frame:
https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Frame ID: 1326D7837DD1DAB89877E6864F83EB7C
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
adobedataencrypter.surge.sh/ |
79 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033__M8MTZS7Nv0I1zR18wdR-g2.css
logincdn.msauth.net/16.000/ |
107 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
logincdn.msauth.net/shared/1.0/content/images/ |
2 KB 758 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
prefetch.aspx
outlook.office365.com/owa/ Frame 1326 |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
logincdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 824 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/15.20.4457.24/scripts/ Frame 1326 |
648 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/15.20.4457.24/scripts/ Frame 1326 |
644 KB 160 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/15.20.4457.24/scripts/ Frame 1326 |
647 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/15.20.4457.24/scripts/ Frame 1326 |
645 KB 143 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/15.20.4457.24/resources/images/0/ Frame 1326 |
132 B 336 B |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
r4.res.office365.com/owa/prem/15.20.4457.24/resources/images/0/ Frame 1326 |
994 B 512 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/15.20.4457.24/resources/styles/0/ Frame 1326 |
227 KB 43 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
outlook.office365.com/ | Name: OIDC Value: 1 |
|
outlook.office365.com/ | Name: ClientId Value: CDCC9A9D18764347B55C44DA39857FC7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
adobedataencrypter.surge.sh
logincdn.msauth.net
outlook.office365.com
r4.res.office365.com
188.166.132.94
192.229.221.185
2603:1026:100:1a::2
2a02:26f0:6c00:2ba::753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