paramerp.in
Open in
urlscan Pro
192.185.25.11
Malicious Activity!
Public Scan
Submission: On June 18 via api from CA
Summary
This is the only time paramerp.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 192.185.25.11 192.185.25.11 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
22 | 3 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: 192-185-25-11.unifiedlayer.com
paramerp.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
paramerp.in
paramerp.in |
902 KB |
7 |
office365.com
r1.res.office365.com |
679 KB |
1 |
gfx.ms
auth.gfx.ms |
40 KB |
22 | 3 |
Domain | Requested by | |
---|---|---|
14 | paramerp.in |
paramerp.in
|
7 | r1.res.office365.com |
paramerp.in
|
1 | auth.gfx.ms |
paramerp.in
|
22 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
account.live.com |
login.live.com |
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://paramerp.in/wp-includes/vee/verify/
Frame ID: 0FC6CF75794522529B272794E3C5C9C8
Requests: 7 HTTP requests in this frame
Frame:
http://paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch.htm
Frame ID: 0589FFE9EBDE0B4525FB77CC466D33C1
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Knockout.js (JavaScript Frameworks) Expand
Detected patterns
- env /^ko$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Forgot my password
Search URL Search Domain Scan URL
Title: Sign in with a different Microsoft account
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
paramerp.in/wp-includes/vee/verify/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Default1033.css
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ |
72 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DefaultLoginStrings1033.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DefaultLogin_Core.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ |
124 KB 47 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Microsoft_Logotype_Gray.svg
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ |
5 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DefaultLogin_Core.js
auth.gfx.ms/16.000.26227.00/ |
124 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.htm
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/ Frame 0589 |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot_003.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
635 KB 211 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
636 KB 197 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot_004.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
633 KB 199 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot_002.js
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
631 KB 167 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.png
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
15 KB 15 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.css
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.css
paramerp.in/wp-includes/vee/verify/Sign%20in%20to%20your%20Microsoft%20account_files/prefetch_data/ Frame 0589 |
156 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js
r1.res.office365.com/owa/prem/16.1166.12.1951793/scripts/ Frame 0589 |
635 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js
r1.res.office365.com/owa/prem/16.1166.12.1951793/scripts/ Frame 0589 |
636 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js
r1.res.office365.com/owa/prem/16.1166.12.1951793/scripts/ Frame 0589 |
633 KB 164 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js
r1.res.office365.com/owa/prem/16.1166.12.1951793/scripts/ Frame 0589 |
631 KB 134 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
r1.res.office365.com/owa/prem/16.1166.12.1951793/resources/images/0/ Frame 0589 |
15 KB 15 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
r1.res.office365.com/owa/prem/16.1166.12.1951793/resources/images/0/ Frame 0589 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
r1.res.office365.com/owa/prem/16.1166.12.1951793/resources/styles/0/ Frame 0589 |
156 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| PROOF number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| g_dtFirstByte object| g_objPageMode boolean| __DefaultLogin_Strings object| wLive string| MasterPageHtml string| FooterControlHtml string| PlaceholderTextboxControlHtml string| ProgressControlHtml string| LearnMoreFlyoutControlHtml string| PhoneFieldHtml string| UsernameSelectFieldHtml string| UsernameFieldHtml string| PasswordFieldHtml string| KmsiFieldHtml string| LinksFieldHtml string| ModalDialogControlHtml string| InstrumentationControlHtml string| LoginPasswordViewHtml string| LoginNGCViewHtml string| LoginFedViewHtml string| LoginPageHtml undefined| __DefaultLogin_Core object| ko0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
paramerp.in
r1.res.office365.com
192.185.25.11
2a02:26f0:6c00:283::34ef
2a02:26f0:6c00:28a::753
0948bc3347e77d1bc951d2bea3f8c7cb75277f79364cb9067346a05ddf7d94a2
1a3260d3f45c88e326e046374ab737a0631de1c5a866913eb2c8acacf370d7ec
356f7d1241f92c9de9c9cfd0bebb6c10d1b38508a3f37cebc26329c656bad19f
46b4f6ddebdd55dbc1dece52399ce2b68d3ed522169ddf72778c39293737f2fe
5901d79ac4c6246a92df6fdc189c0f9c9011f093b79a2da930a3649f20a1038d
59f845b08a694cb5c30f5c74e9cb5a2a50a2bb252ca2957c5e41eec13eb829a8
6f7bc22797b545e65cc3a4937f82f47291d1e003ab1b3ec2b78e736b8e73063f
7d563785e3d789b3e1ccd09a79a4d5e0ae8a2d415c10bce537c49c50325bec0c
821d6cd0de614d76a2c1c68f1492c9f60802c205507cc21d354e4a057bfdc716
9abab0b217d4a65f16b3a0ecc5b0dd87595ef96fda07c4746f0dc5e52785060d
a238ad4f6c72a25320537a3337e7adb58d56faa49ff11512c49f152d7330236f
acc5c72c57df0a06f25ba3d56c2c35375d10bf376fccca83f03d5d34c7063d8f
bf9d3cc7909ef72266b291801c4c41e6f27d741a87be5e91e4bde8a75129108d
d4b00b3d0ff199ee54e03c283b36948b9897835e38a68ce8e2b9da7f913a19fc