ghostsmtp.com
Open in
urlscan Pro
2606:4700:3034::6818:6398
Malicious Activity!
Public Scan
Submission: On May 18 via manual from US
Summary
This is the only time ghostsmtp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3034::6818:6398 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 40.90.23.153 40.90.23.153 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2620:1ec:a92:... 2620:1ec:a92::156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
11 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
msftauth.net
aadcdn.msftauth.net |
455 KB |
1 |
office.com
www.office.com |
|
1 |
live.com
login.live.com |
|
1 |
ghostsmtp.com
ghostsmtp.com |
9 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
8 | aadcdn.msftauth.net |
ghostsmtp.com
|
1 | www.office.com |
ghostsmtp.com
|
1 | login.live.com |
ghostsmtp.com
|
1 | ghostsmtp.com | |
11 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
login.live.com |
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
aadcdn.msftauth.net Microsoft IT TLS CA 5 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
login.live.com Microsoft IT TLS CA 1 |
2019-11-05 - 2021-11-05 |
2 years | crt.sh |
portal.office.com Microsoft IT TLS CA 5 |
2019-09-04 - 2021-09-04 |
2 years | crt.sh |
This page contains 3 frames:
Primary Page:
http://ghostsmtp.com/email-list/officenewnew/login.php
Frame ID: 82D7591F5F176A61C866A891CE9760F0
Requests: 9 HTTP requests in this frame
Frame:
https://login.live.com/Me.htm?v=1
Frame ID: FD2B12FE5A88038841AA642D4229947C
Requests: 1 HTTP requests in this frame
Frame:
https://www.office.com/prefetch/prefetch
Frame ID: 57128BE133F9D0FD0DB6270735E9509F
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
ghostsmtp.com/email-list/officenewnew/ |
27 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_bxeixgi3llnj-nuc4-xqwa2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
98 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.pcore.min_4myuo72mlhdkjc9hn1du5g2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
555 KB 144 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en.min_veg9zg4gq7m3vyno9nzqga2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
31 KB 10 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 414 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 413 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Me.htm
login.live.com/ Frame FD2B |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prefetch
www.office.com/prefetch/ Frame 5712 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| webpackJsonp object| StringRepository object| PROOF boolean| __8 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
outlook.office365.com/ | Name: OIDC Value: 1 |
|
.login.live.com/ | Name: MSPRequ Value: id=N<=1589819884&co=1 |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-weu |
|
outlook.office365.com/ | Name: ClientId Value: 95E49EC7CC6B4FF5A42498301E4257A1 |
|
.office.com/ | Name: MUID Value: 024D803E14576EAF02BB8EF0152C6F4B |
|
www.office.com/ | Name: OH.SID Value: f52da6ef-3892-4f40-ac34-c46952935ab1 |
|
.login.live.com/ | Name: uaid Value: 2664ce7e9aeb4b4a916b20240d54269c |
|
.ghostsmtp.com/ | Name: __cfduid Value: de6ed93db19c5e7e684312043c85acad31589819880 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
ghostsmtp.com
login.live.com
www.office.com
152.199.23.37
2606:4700:3034::6818:6398
2620:1ec:a92::156
40.90.23.153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