invoice.qulcklooks.com
Open in
urlscan Pro
137.184.172.206
Malicious Activity!
Public Scan
Effective URL: https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index.php
Submission: On January 17 via manual from CA — Scanned from CA
Summary
TLS certificate: Issued by R3 on January 17th 2023. Valid for: 3 months.
This is the only time invoice.qulcklooks.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 17 | 137.184.172.206 137.184.172.206 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
7 | 2600:141b:f00... 2600:141b:f000:25::684d:a215 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
22 | 2 |
ASN20940 (AKAMAI-ASN1, NL)
r4.res.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
qulcklooks.com
2 redirects
invoice.qulcklooks.com |
364 KB |
7 |
office365.com
r4.res.office365.com — Cisco Umbrella Rank: 178 |
705 KB |
22 | 2 |
Domain | Requested by | |
---|---|---|
17 | invoice.qulcklooks.com |
2 redirects
invoice.qulcklooks.com
|
7 | r4.res.office365.com |
invoice.qulcklooks.com
|
22 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
invoice.qulcklooks.com R3 |
2023-01-17 - 2023-04-17 |
3 months | crt.sh |
*.res.outlook.com DigiCert SHA2 Secure Server CA |
2022-11-15 - 2023-11-15 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index.php
Frame ID: 7789BA1C81C050F389A6A13690BD6687
Requests: 7 HTTP requests in this frame
Frame:
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/prefetch.html
Frame ID: B636CAFFE6D05DBAA6816BA7916483B9
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountSign in to your accountPage URL History Show full URLs
-
https://invoice.qulcklooks.com/
HTTP 302
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/s.php?mail=&lf= HTTP 302
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://invoice.qulcklooks.com/
HTTP 302
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/s.php?mail=&lf= HTTP 302
https://invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/ Redirect Chain
|
20 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min.css
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ |
93 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white.svg
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey.svg
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
"e;;
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/ |
808 B 808 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
back.jpg
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prefetch.html
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
invoice.qulcklooks.com/d79f450d89b0eab12690458cdf35f469/index_files/ Frame B636 |
227 KB 40 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B636 |
647 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B636 |
642 KB 159 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B636 |
645 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B636 |
642 KB 142 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/images/0/ Frame B636 |
16 KB 17 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/images/0/ Frame B636 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/styles/0/ Frame B636 |
227 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontentvisibilityautostatechange2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
invoice.qulcklooks.com/ | Name: PHPSESSID Value: i306qjv1i7vmcupln0q7ou3tm5 |
|
invoice.qulcklooks.com/ | Name: OWAPF Value: p:undefined11111111& |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
invoice.qulcklooks.com
r4.res.office365.com
137.184.172.206
2600:141b:f000:25::684d:a215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