rafa.yacarehosting.com
Open in
urlscan Pro
66.94.96.105
Malicious Activity!
Public Scan
Submission: On February 21 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 30th 2023. Valid for: 3 months.
This is the only time rafa.yacarehosting.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 66.94.96.105 66.94.96.105 | 40021 (CONTABO) (CONTABO) | |
6 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
7 | 2 |
ASN40021 (CONTABO, US)
PTR: vmi636860.contaboserver.net
rafa.yacarehosting.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 3793 |
24 KB |
1 |
yacarehosting.com
rafa.yacarehosting.com |
72 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | logincdn.msauth.net |
rafa.yacarehosting.com
|
1 | rafa.yacarehosting.com | |
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpanel.rafa.yacarehosting.com R3 |
2023-01-30 - 2023-04-30 |
3 months | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 06 |
2022-08-23 - 2023-08-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://rafa.yacarehosting.com/main/v5.2/___.php?_do=layout&email
Frame ID: 9197BB00E233BD01F1BD18EF90B2B070
Requests: 7 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Sign in with a security key
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
___.php
rafa.yacarehosting.com/main/v5.2/ |
71 KB 72 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033__M8MTZS7Nv0I1zR18wdR-g2.css
logincdn.msauth.net/16.000/ |
107 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
logincdn.msauth.net/shared/1.0/content/images/ |
2 KB 758 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
logincdn.msauth.net/shared/1.0/content/images/ |
513 B 441 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-options_4e48046ce74f4b89d45037c90576bfac.svg
logincdn.msauth.net/shared/1.0/content/images/ |
2 KB 772 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
logincdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 825 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| oncontentvisibilityautostatechange function| getUrlParameter function| loadJs function| isEmptyObject function| isObjectEmpty0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
logincdn.msauth.net
rafa.yacarehosting.com
192.229.221.185
66.94.96.105
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0ac8b6a8684b8f3b6a08d05dc4f2e52d2d713738d7cbf53f57e1b25723b2ec78
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
6099ca3afb2bad6883021c5aa6941615a9e92428d9936d09c522c371f803cbdc
8e6db1634f1812d42516778fc890010aa57f3e39914fb4803df2c38abbf56d93
a76c08e9cdc3bb87bfb57627ad8f6b46f0e5ef826cc7f046dfbaf25d7b7958ea