idgedl.net
Open in
urlscan Pro
162.241.87.207
Malicious Activity!
Public Scan
Effective URL: https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/s2lldox998hdbhos7gswwpdq.php?rand=13Inbo...
Submission Tags: @ecarlesi threat phishing microsoft Search All
Submission: On November 19 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by R10 on November 10th 2024. Valid for: 3 months.
This is the only time idgedl.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 162.241.87.207 162.241.87.207 | 19871 (NETWORK-S...) (NETWORK-SOLUTIONS-HOSTING) | |
8 | 2 |
ASN19871 (NETWORK-SOLUTIONS-HOSTING, US)
PTR: 162-241-87-207.webhostbox.net
idgedl.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
idgedl.net
2 redirects
idgedl.net |
137 KB |
0 |
microsoftonline-p.com
Failed
secure.aadcdn.microsoftonline-p.com Failed |
|
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | idgedl.net |
2 redirects
idgedl.net
|
0 | secure.aadcdn.microsoftonline-p.com Failed |
idgedl.net
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.idgedl.net R10 |
2024-11-10 - 2025-02-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/s2lldox998hdbhos7gswwpdq.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4
Frame ID: 3B3DC9D9A06C867310C1F8007A21FC24
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Sign in to your accountPage URL History Show full URLs
-
http://idgedl.net/office/login/
HTTP 307
https://idgedl.net/office/login/ HTTP 302
https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/?reff=ODU4ZGNjNTA5Ym... HTTP 302
https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/s2lldox998hdbhos7gsw... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- \.aspx?(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://idgedl.net/office/login/
HTTP 307
https://idgedl.net/office/login/ HTTP 302
https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/?reff=ODU4ZGNjNTA5YmJmODg5ZWY3ZjU4YjY5NjdiYTNjMWQ= HTTP 302
https://idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/s2lldox998hdbhos7gswwpdq.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
s2lldox998hdbhos7gswwpdq.php
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/ Redirect Chain
|
24 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.login.min.css
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/files/ |
84 KB 85 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
convergedlogin_pcore.min.js
secure.aadcdn.microsoftonline-p.com/ests/2.1.6348.16/content/cdnbundles/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
convergedloginpaginatedstrings-en-gb.min.js
secure.aadcdn.microsoftonline-p.com/ests/2.1.6348.16/content/cdnbundles/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bannerlogo
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/files/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/files/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picker_account_aad.svg
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/files/ |
756 B 1002 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon_a.ico
idgedl.net/office/login/cmd-login=0e565c650735b8545b46a36fbd44699b/files/ |
17 KB 17 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- secure.aadcdn.microsoftonline-p.com
- URL
- https://secure.aadcdn.microsoftonline-p.com/ests/2.1.6348.16/content/cdnbundles/convergedlogin_pcore.min.js
- Domain
- secure.aadcdn.microsoftonline-p.com
- URL
- https://secure.aadcdn.microsoftonline-p.com/ests/2.1.6348.16/content/cdnbundles/convergedloginpaginatedstrings-en-gb.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online) Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| $Debug object| $Do1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
idgedl.net/ | Name: PHPSESSID Value: d1a2bc1f78b87cfd5636fbf335a1c3db |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
idgedl.net
secure.aadcdn.microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com
162.241.87.207
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
4f962ec8ae085492d496fcbbd74185ab1c8e377438dbcb5ec4f8517b7bd9293f
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
8e667c697c6138fbb415c97e64e070129b0390dbf3822ddbf42063c6da349193
90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21
fc5c3d7d2b298a42ec44dad2d8cd227b734db966b4afa68c0254a497e805f603