login.login.mscrosoftonline.spb.ru Open in urlscan Pro
103.155.92.99  Malicious Activity! Public Scan

Submitted URL: https://api2.gttwl.net/tm/c/1950/AKLIYPU?post_id=686875&url=https://www.arllrie.bir.ru/AKLIYPU/;46c6c657769734063677369...
Effective URL: https://login.login.mscrosoftonline.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115...
Submission: On December 13 via manual from IN — Scanned from DE

Summary

This website contacted 4 IPs in 3 countries across 3 domains to perform 3 HTTP transactions. The main IP is 103.155.92.99, located in Malaysia and belongs to HOSTKEY-RU-AS, NL. The main domain is login.login.mscrosoftonline.spb.ru.
TLS certificate: Issued by R3 on December 11th 2021. Valid for: 3 months.
This is the only time login.login.mscrosoftonline.spb.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 51.81.245.63 16276 (OVH)
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 185.66.88.224 30860 (YURTEH-AS)
1 103.155.92.99 50867 (HOSTKEY-R...)
3 4
Domain Requested by
1 login.login.mscrosoftonline.spb.ru
1 945639.enegizeell.bir.ru www.arllrie.bir.ru
1 www.arllrie.bir.ru
1 api2.gttwl.net 1 redirects
3 4

This site contains links to these domains. Also see Links.

Domain
go.microsoft.com
Subject Issuer Validity Valid
*.arllrie.bir.ru
R3
2021-12-13 -
2022-03-13
3 months crt.sh
login.login.mscrosoftonline.spb.ru
R3
2021-12-11 -
2022-03-11
3 months crt.sh

This page contains 1 frames:

Primary Page: https://login.login.mscrosoftonline.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850
Frame ID: A628488804624CA06EBDCBC5E3773A26
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Please Wait.

Page URL History Show full URLs

  1. https://api2.gttwl.net/tm/c/1950/AKLIYPU?post_id=686875&url=https://www.arllrie.bir.ru/AKLIYPU/;46c... HTTP 302
    https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d Page URL
  2. http://945639.enegizeell.bir.ru/918586/46c6c6577697340636773696e632e636f6d Page URL
  3. https://login.login.mscrosoftonline.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796... Page URL

Page Statistics

3
Requests

67 %
HTTPS

25 %
IPv6

3
Domains

4
Subdomains

4
IPs

3
Countries

27 kB
Transfer

42 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://api2.gttwl.net/tm/c/1950/AKLIYPU?post_id=686875&url=https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d HTTP 302
    https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d Page URL
  2. http://945639.enegizeell.bir.ru/918586/46c6c6577697340636773696e632e636f6d Page URL
  3. https://login.login.mscrosoftonline.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://api2.gttwl.net/tm/c/1950/AKLIYPU?post_id=686875&url=https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d HTTP 302
  • https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
;46c6c6577697340636773696e632e636f6d
www.arllrie.bir.ru/AKLIYPU/
Redirect Chain
  • https://api2.gttwl.net/tm/c/1950/AKLIYPU?post_id=686875&url=https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
  • https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
140 B
809 B
Document
General
Full URL
https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::ac43:8feb , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
bb197e2db12e0aff76bd6a5c68866d112304fa6e9da1d35123f8f47199d7fb65

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Mon, 13 Dec 2021 15:55:23 GMT
content-type
text/html; charset=UTF-8
expires
Wed, 11 Jan 1984 05:00:00 GMT
cache-control
no-cache, must-revalidate, max-age=0
link
<https://synepsepdi.com/wp-json/>; rel="https://api.w.org/"
vary
Accept-Encoding
x-turbo-charged-by
LiteSpeed
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dBp5i0HhG%2FX%2BgvJqngHqtKRbyyRmzyecUhvmru5iHPC17V1re2B3iH2N3h2p2XYCDF14t7yUx8610d4zC5FHi31kmjivP64BGYrgAefZqdWKPCJhG1CP5QKPj5IVz3M8v6c0xSIl%2F52gtMkaPd7wdYQ%3D"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
6bd0605eadac692d-FRA
content-encoding
br
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

Redirect headers

cache-control
max-age=0, private, must-revalidate
content-type
text/html; charset=utf-8
date
Mon, 13 Dec 2021 15:55:23 GMT
location
https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
server
Caddy Cowboy
x-request-id
FsBbjHMbBhX6_SIBWlUi
content-length
137
46c6c6577697340636773696e632e636f6d
945639.enegizeell.bir.ru/918586/
7 KB
8 KB
Document
General
Full URL
http://945639.enegizeell.bir.ru/918586/46c6c6577697340636773696e632e636f6d
Requested by
Host: www.arllrie.bir.ru
URL: https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
Protocol
HTTP/1.1
Server
185.66.88.224 , Ukraine, ASN30860 (YURTEH-AS, UA),
Reverse DNS
dedicated.vsys.host
Software
Apache /
Resource Hash
72207087e44bfa1ae4b9d1ed0ced8777a220c1615fa28e052ac1a4f1a59d394f

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Mon, 13 Dec 2021 15:55:23 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a00f7ed35be5bfea9cbbdcbeca07f536d9db6fb6391ca55ad38790eecb01ffeb

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://945639.enegizeell.bir.ru/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
Primary Request &sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850
login.login.mscrosoftonline.spb.ru/
19 KB
19 KB
Document
General
Full URL
https://login.login.mscrosoftonline.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
103.155.92.99 , Malaysia, ASN50867 (HOSTKEY-RU-AS, NL),
Reverse DNS
server1.kamon.la
Software
/
Resource Hash
9b042ed393987399678df0a82668beb89417e91b02d73eb8c88eac3f29d20cff

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
http://945639.enegizeell.bir.ru/

Response headers

Connection
close
Content-Type
text/html
Transfer-Encoding
chunked
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1d897be06939113f08ad0df073eb29b3629e1a098edd59a5495a5a34d09167ea

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3cc04c775324677251c2417d059389ffbdf0119977bb6a0be8a30c8b9ef44523

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| load

2 Cookies

Domain/Path Name / Value
api2.gttwl.net/tm Name: __tat_u
Value: 70a938c6-ed96-4d14-b43a-16248c69f9c8
.login.mscrosoftonline.spb.ru/ Name: AVmt
Value: 422873e81512bfa798c1925933b8bb766783888b42c3450add6fd93a2b59aad1

1 Console Messages

Source Level URL
Text
network error URL: https://www.arllrie.bir.ru/AKLIYPU/;46c6c6577697340636773696e632e636f6d
Message:
Failed to load resource: the server responded with a status of 404 ()