file-upload-debol87sgsjd64682.ngrok.io
Open in
urlscan Pro
2600:1f16:59e:b200:9824:7fb2:162:d476
Malicious Activity!
Public Scan
Effective URL: https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/login.php?cmd=login_submit&id=7219269bf651aaec5d9c08d8fd8fe4e07219269bf651aaec5d9c08d8...
Submission: On May 15 via manual from US
Summary
TLS certificate: Issued by RapidSSL RSA CA 2018 on March 11th 2019. Valid for: a year.
This is the only time file-upload-debol87sgsjd64682.ngrok.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.11 67.199.248.11 | 395224 (BITLY-AS) (BITLY-AS - Bitly Inc) | |
1 1 | 34.197.0.138 34.197.0.138 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 13 | 2600:1f16:59e... 2600:1f16:59e:b200:9824:7fb2:162:d476 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 35.157.3.192 35.157.3.192 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
22 | 3 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-34-197-0-138.compute-1.amazonaws.com
rebrand.ly |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
file-upload-debol87sgsjd64682.ngrok.io |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-35-157-3-192.eu-central-1.compute.amazonaws.com
nexus.ensighten.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
ngrok.io
1 redirects
file-upload-debol87sgsjd64682.ngrok.io |
760 KB |
2 |
ensighten.com
nexus.ensighten.com |
1 KB |
1 |
rebrand.ly
1 redirects
rebrand.ly |
283 B |
1 |
bit.ly
1 redirects
bit.ly |
420 B |
0 |
microsoft.com
Failed
cs.microsoft.com Failed |
|
22 | 5 |
Domain | Requested by | |
---|---|---|
13 | file-upload-debol87sgsjd64682.ngrok.io |
1 redirects
file-upload-debol87sgsjd64682.ngrok.io
|
2 | nexus.ensighten.com |
file-upload-debol87sgsjd64682.ngrok.io
|
1 | rebrand.ly | 1 redirects |
1 | bit.ly | 1 redirects |
0 | cs.microsoft.com Failed |
file-upload-debol87sgsjd64682.ngrok.io
|
22 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ngrok.io RapidSSL RSA CA 2018 |
2019-03-11 - 2020-03-11 |
a year | crt.sh |
nexus.ensighten.com DigiCert SHA2 Secure Server CA |
2018-10-17 - 2020-01-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/login.php?cmd=login_submit&id=7219269bf651aaec5d9c08d8fd8fe4e07219269bf651aaec5d9c08d8fd8fe4e0&session=7219269bf651aaec5d9c08d8fd8fe4e07219269bf651aaec5d9c08d8fd8fe4e0
Frame ID: 80B9D8E9FC858292642A3C89827DB4A1
Requests: 22 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bit.ly/2w28gpz
HTTP 301
https://rebrand.ly/openlink HTTP 301
https://file-upload-debol87sgsjd64682.ngrok.io/?authentication=valid Page URL
-
https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/
HTTP 302
https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/login.php?cmd=login_submit&id=7219269bf651aaec5d9c08d8fd8fe4e07219... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- env /^requirejs$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bit.ly/2w28gpz
HTTP 301
https://rebrand.ly/openlink HTTP 301
https://file-upload-debol87sgsjd64682.ngrok.io/?authentication=valid Page URL
-
https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/
HTTP 302
https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/login.php?cmd=login_submit&id=7219269bf651aaec5d9c08d8fd8fe4e07219269bf651aaec5d9c08d8fd8fe4e0&session=7219269bf651aaec5d9c08d8fd8fe4e07219269bf651aaec5d9c08d8fd8fe4e0 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://bit.ly/2w28gpz HTTP 301
- https://rebrand.ly/openlink HTTP 301
- https://file-upload-debol87sgsjd64682.ngrok.io/?authentication=valid
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
file-upload-debol87sgsjd64682.ngrok.io/ Redirect Chain
|
621 B 799 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onedrive_new.png
file-upload-debol87sgsjd64682.ngrok.io/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
file-upload-debol87sgsjd64682.ngrok.io/user-auth/ Redirect Chain
|
392 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Bootstrap.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
51 KB 51 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ms.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
12 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jsll-4.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
51 KB 52 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
195 KB 195 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require-951f856e.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
97-b6864d.css
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
126 KB 126 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
42 KB 42 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
homeappfonts-e1a2082a.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
188 KB 188 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aria-4cf8a7e2.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
45 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
getid.js
cs.microsoft.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serverComponent.php
nexus.ensighten.com/msftoffice/prod/ |
335 B 572 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f6365f75b501f300457bb7fca6bbfcab.js
nexus.ensighten.com/msftoffice/prod/code/ |
468 B 761 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2523150420.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
t.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-2.js
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
5f-c2d29a
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
meversion
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
microsoft-gray.png
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
down.png
file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cs.microsoft.com
- URL
- https://cs.microsoft.com/getid.js?jsoncb=MscomSetFPC
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/2523150420.js
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/t.js
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/jquery-2.js
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/5f-c2d29a
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/meversion
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/microsoft-gray.png
- Domain
- file-upload-debol87sgsjd64682.ngrok.io
- URL
- https://file-upload-debol87sgsjd64682.ngrok.io/user-auth/signin_files/down.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)88 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| showWhite function| hideWhite function| popupwnd function| MscomInit function| MscomProvisionFPC function| MscomSetFPC function| MscomGetFPC function| MscomGetClientCookies function| MscomGetCookieKeyValue function| MscomGetCookie function| MscomSendPageView function| MscomCustomEvent function| MscomProcessClick function| MscomBeacon function| MscomGetDebugValues function| MscomSetTitle function| MscomSetTimeZoneOffSet function| MscomSetReferrer function| MscomSetTimeStamp function| MscomSetScreenResolution function| MscomSetClickStreamFlag function| MscomReadAllTags function| MscomSetCot function| MscomSetSharedData function| MscomGetCurrentSD function| MscomGetFlashInfo function| MscomGetSilverLightInfo function| MscomInitMeta function| MscomReadElementTags function| MscomSetEventId function| MscomGetBrowserSize function| MscomSetRouteCtrl function| MscomGetCTypeHpInfo function| MscomIsHP function| MscomSetCookieDisabledFlag function| GuidPart function| GenerateGuid function| MscomGetSlvVersion function| Mscomdebug function| MscomGetId function| MscomGetImageHREF function| MscomIsInList function| MscomsetEvents function| MscomGetMUID function| MscomEncode function| Mscomdecode function| MscomGetStrFromArray function| MscomResetArrays function| MscomIsPII object| wcsIAr number| wcsIArI object| wedcsCE string| wcsTPUrl number| wcsPVsFpc number| wcsEFpc number| wcsCDFpc string| wcsFpcC number| wcsFpcSet string| wcsFPCUrl number| wcsAfPV number| wcsMUIDset string| wcsOrPms object| wcsccks string| customTags string| clickInfo string| customInfo object| wcs object| na object| ms number| vs object| expireDate string| wcsSId object| ensBootstraps object| Bootstrapper object| awa string| behaviorKey object| FB function| requirejs function| require function| define string| psj0 object| clienttelemetry_build object| Microsoft object| sct object| microsoft0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.ly
cs.microsoft.com
file-upload-debol87sgsjd64682.ngrok.io
nexus.ensighten.com
rebrand.ly
cs.microsoft.com
file-upload-debol87sgsjd64682.ngrok.io
2600:1f16:59e:b200:9824:7fb2:162:d476
34.197.0.138
35.157.3.192
67.199.248.11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