vadsaz.dns.army
Open in
urlscan Pro
107.174.244.100
Malicious Activity!
Public Scan
Submission: On July 18 via automatic, source openphish — Scanned from DE
Summary
This is the only time vadsaz.dns.army was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 107.174.244.100 107.174.244.100 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
7 | 2a02:26f0:ef:... 2a02:26f0:ef:2a9::1e0f | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
20 | 2 |
ASN36352 (AS-COLOCROSSING, US)
PTR: requestdisk.net
vadsaz.dns.army |
ASN20940 (AKAMAI-ASN1, NL)
r4.res.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
dns.army
vadsaz.dns.army |
721 KB |
7 |
office365.com
r4.res.office365.com — Cisco Umbrella Rank: 132 |
690 KB |
20 | 2 |
Domain | Requested by | |
---|---|---|
13 | vadsaz.dns.army |
vadsaz.dns.army
|
7 | r4.res.office365.com |
vadsaz.dns.army
|
20 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.res.outlook.com Microsoft RSA TLS CA 01 |
2022-06-02 - 2023-06-02 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
http://vadsaz.dns.army/e-redacted-fxbmfcyr7icz4s2tvida9n0jejlg3k1ho5u6pnab-99a07cc810169d8dc71ce32f5fd31d81-5813218b4e1f01c888a0c06f4f02dd3070e8fb
Frame ID: 2AFBA90ED84FA50DAD06B053D55043D5
Requests: 5 HTTP requests in this frame
Frame:
http://vadsaz.dns.army/index_files/prefetch.html
Frame ID: 2BCE7B68237DB6851EB27757B0F52115
Requests: 15 HTTP requests in this frame
4 Outgoing links
These are links going to different origins than the main page.
Title: Forgot password?
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Title: ...
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
e-redacted-fxbmfcyr7icz4s2tvida9n0jejlg3k1ho5u6pnab-99a07cc810169d8dc71ce32f5fd31d81-5813218b4e1f01c888a0c06f4f02dd3070e8fb
vadsaz.dns.army/ |
25 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged_v21033_-__Cqeow2darz41wUymj4A2.css
vadsaz.dns.army/index_files/ |
107 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
vadsaz.dns.army/index_files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
vadsaz.dns.army/index_files/ |
513 B 586 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
vadsaz.dns.army/index_files/ Frame 2BCE |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2_bc3d32a696895f78c19df6c717586a5d.svg
vadsaz.dns.army/images/backgrounds/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js.download
vadsaz.dns.army/index_files/ Frame 2BCE |
648 KB 176 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js.download
vadsaz.dns.army/index_files/ Frame 2BCE |
644 KB 160 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js.download
vadsaz.dns.army/index_files/ Frame 2BCE |
647 KB 166 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js.download
vadsaz.dns.army/index_files/ Frame 2BCE |
645 KB 143 KB |
Stylesheet
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
vadsaz.dns.army/index_files/ Frame 2BCE |
132 B 391 B |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
vadsaz.dns.army/index_files/ Frame 2BCE |
994 B 599 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
vadsaz.dns.army/index_files/ Frame 2BCE |
227 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/15.20.5395.18/scripts/ Frame 2BCE |
648 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/15.20.5395.18/scripts/ Frame 2BCE |
644 KB 160 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/15.20.5395.18/scripts/ Frame 2BCE |
647 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/15.20.5395.18/scripts/ Frame 2BCE |
645 KB 143 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/15.20.5395.18/resources/images/0/ Frame 2BCE |
132 B 336 B |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.css
r4.res.office365.com/owa/prem/15.20.5395.18/resources/images/0/ Frame 2BCE |
994 B 512 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/15.20.5395.18/resources/styles/0/ Frame 2BCE |
227 KB 43 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vadsaz.dns.army/ | Name: OWAPF Value: p:undefined11111111& |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
r4.res.office365.com
vadsaz.dns.army
107.174.244.100
2a02:26f0:ef:2a9::1e0f
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
27776b8e1698f8280e3b06cbc1c08b7237e456e65261da92ab6d8796eb9883c6
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
37619b16288166cc76403f0b7df6586349b2d5628de00d5850c815d019b17904
3ab09a213eedd51a0eb0e4bc5e6e96c472032dd937420e7e233ea54775c7e024
6d1be7ed96dd494447f348986317faf64728ccf788be551f2a621b31ddc929ac
7dd9c089f7909b7ee8b3787f170f541f2e163ec13bb08dc5881d8b8c5b70f017
8533d0f21e61506e6a8e9517b63019a16b2af69805c6f2c86c02f6319e14de5d
b1b08d26879a443eca979de557de8442e1d37e5933ecbd4a84b035df43ed9f60
b5796344a90d2461adaf511d8f332666ae5ded28b205f55ab3e9bb6049ed2abc
c7bcfcd2305204dd3ded9a440c9a0a67b14f8d63224ed72795b23243d90a6771
d5238dcd5576de5c01381727798f579c4722e1c0b07f544135fbe537d7ccf94f
de0f92ef7a4af7309ba09f3496b162eaf397c6b2a4bf0b91bb8db0f8e1d0241f