spaelock.ga
Open in
urlscan Pro
162.241.124.25
Malicious Activity!
Public Scan
Effective URL: https://spaelock.ga/KRYvkHwEnGtVaqSeQ9OrcJ54UlAX27i6zPTFfDZ38oWumsbh1xMpyCgjLIB0gI1yWY9kfrXebZwoxRAO0nFCHNi2qQ4hKvDm...
Submission: On May 06 via manual from MD
Summary
TLS certificate: Issued by R3 on May 4th 2021. Valid for: 3 months.
This is the only time spaelock.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
3 | 162.241.124.25 162.241.124.25 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
6 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:46::44 2620:1ec:46::44 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
10 | 3 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u18781506.ct.sendgrid.net |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-124-25.unifiedlayer.com
rustyark.ga | |
spaelock.ga |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
msftauth.net
aadcdn.msftauth.net |
4 KB |
2 |
spaelock.ga
spaelock.ga |
167 KB |
1 |
msauth.net
aadcdn.msauth.net |
1 KB |
1 |
rustyark.ga
rustyark.ga |
546 B |
1 |
sendgrid.net
1 redirects
u18781506.ct.sendgrid.net |
264 B |
10 | 5 |
Domain | Requested by | |
---|---|---|
6 | aadcdn.msftauth.net |
spaelock.ga
|
2 | spaelock.ga |
rustyark.ga
spaelock.ga |
1 | aadcdn.msauth.net |
spaelock.ga
|
1 | rustyark.ga | |
1 | u18781506.ct.sendgrid.net | 1 redirects |
10 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.rustyark.ga R3 |
2021-04-10 - 2021-07-09 |
3 months | crt.sh |
www.spaelock.ga R3 |
2021-05-04 - 2021-08-02 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2020-07-09 - 2021-07-09 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-04-07 - 2022-04-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://spaelock.ga/KRYvkHwEnGtVaqSeQ9OrcJ54UlAX27i6zPTFfDZ38oWumsbh1xMpyCgjLIB0gI1yWY9kfrXebZwoxRAO0nFCHNi2qQ4hKvDmlG6szcLP7UaJ5t8B3TMVSuEjFKj2srU85hWuGiqRvVakPnOMDbBzIScHJ61YxpXeol9ANfEt0wmC743ZyLgQpmP6XxM8lkVghRfz7BF1TKv9QCowDOt3EYcAjqIuG5U4nsZeLWHSb2irNa0y/9ovHV1i5guLEcBXjyGDbxzMatWn3FwOY4ZC2KTq0hN6r7ARSpJklmPeUQfsI.php
Frame ID: 41F220469313335B52B0233351787B70
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u18781506.ct.sendgrid.net/ls/click?upn=EuTQq-2B9iVnBlbPmcptqtDGKKLzVn9DJ739H6fkWSlmboLm-2Fewz1P1JOIMQa...
HTTP 302
https://rustyark.ga/?uai= Page URL
- https://spaelock.ga/ZmlsaXAua29ja3hAa2F0b2VubmF0aWUuY29t Page URL
- https://spaelock.ga/KRYvkHwEnGtVaqSeQ9OrcJ54UlAX27i6zPTFfDZ38oWumsbh1xMpyCgjLIB0gI1yWY9kfrXebZwo... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u18781506.ct.sendgrid.net/ls/click?upn=EuTQq-2B9iVnBlbPmcptqtDGKKLzVn9DJ739H6fkWSlmboLm-2Fewz1P1JOIMQasJAwx-2FtuhS0ZHoncXynYoLYhWHMjEWf2mDkiDcxnHApeLhpo-3DC5wr_sOhqRPzZwyMr0e6WWQ3-2FRX6KYl73EI6xOtbC46pxawNvjS4DfUovWKsJ8bONGkd6w7PNFMq19x3LUs-2Fie3-2F1YqcKwlfn6S9a1C14A-2BWyX72PwrfvwIy6KSKzVXl665zVS6vdfsODlVZh7yx2ymOuJtlRWRwhFTOrya4csewSoI-2FiR2THVbsA-2B7yhzAiFdZPs0VyK-2Fm-2FZyiNuSZzi5Rgata6h3v-2B5DYiUEy6OdBFnYNk-3D
HTTP 302
https://rustyark.ga/?uai= Page URL
- https://spaelock.ga/ZmlsaXAua29ja3hAa2F0b2VubmF0aWUuY29t Page URL
- https://spaelock.ga/KRYvkHwEnGtVaqSeQ9OrcJ54UlAX27i6zPTFfDZ38oWumsbh1xMpyCgjLIB0gI1yWY9kfrXebZwoxRAO0nFCHNi2qQ4hKvDmlG6szcLP7UaJ5t8B3TMVSuEjFKj2srU85hWuGiqRvVakPnOMDbBzIScHJ61YxpXeol9ANfEt0wmC743ZyLgQpmP6XxM8lkVghRfz7BF1TKv9QCowDOt3EYcAjqIuG5U4nsZeLWHSb2irNa0y/9ovHV1i5guLEcBXjyGDbxzMatWn3FwOY4ZC2KTq0hN6r7ARSpJklmPeUQfsI.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://u18781506.ct.sendgrid.net/ls/click?upn=EuTQq-2B9iVnBlbPmcptqtDGKKLzVn9DJ739H6fkWSlmboLm-2Fewz1P1JOIMQasJAwx-2FtuhS0ZHoncXynYoLYhWHMjEWf2mDkiDcxnHApeLhpo-3DC5wr_sOhqRPzZwyMr0e6WWQ3-2FRX6KYl73EI6xOtbC46pxawNvjS4DfUovWKsJ8bONGkd6w7PNFMq19x3LUs-2Fie3-2F1YqcKwlfn6S9a1C14A-2BWyX72PwrfvwIy6KSKzVXl665zVS6vdfsODlVZh7yx2ymOuJtlRWRwhFTOrya4csewSoI-2FiR2THVbsA-2B7yhzAiFdZPs0VyK-2Fm-2FZyiNuSZzi5Rgata6h3v-2B5DYiUEy6OdBFnYNk-3D HTTP 302
- https://rustyark.ga/?uai=
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
rustyark.ga/ Redirect Chain
|
338 B 546 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
ZmlsaXAua29ja3hAa2F0b2VubmF0aWUuY29t
spaelock.ga/ |
351 B 740 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
9ovHV1i5guLEcBXjyGDbxzMatWn3FwOY4ZC2KTq0hN6r7ARSpJklmPeUQfsI.php
spaelock.ga/KRYvkHwEnGtVaqSeQ9OrcJ54UlAX27i6zPTFfDZ38oWumsbh1xMpyCgjLIB0gI1yWY9kfrXebZwoxRAO0nFCHNi2qQ4hKvDmlG6szcLP7UaJ5t8B3TMVSuEjFKj2srU85hWuGiqRvVakPnOMDbBzIScHJ61YxpXeol9ANfEt0wmC743ZyLgQpmP6X... |
165 KB 166 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
info_4883eb1a3cbdddf5a79e28d320cfe5a9.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
342 B 598 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_account_aad_9de70d1c5191d1852a0d5aac28b44a6c.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
756 B 546 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_more_7568a43cf440757c55d2e7f51557ae1f.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
899 B 408 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_account_add_56e73414003cdb676008ff7857343074.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
222 B 334 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 415 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
spaelock.ga/ | Name: PHPSESSID Value: 0d64714b835b987b9bc666605ce2825b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
aadcdn.msftauth.net
rustyark.ga
spaelock.ga
u18781506.ct.sendgrid.net
152.199.23.37
162.241.124.25
167.89.123.16
2620:1ec:46::44
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
315c043e1e94e04e8445a5671d4f159bf9a0530460d6f546ce889f724ca8aaa3
3977bac9ecf6f50dfaaddedb0eae862bede3b8e0cb274f914b51508f0cf3aab4
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2
c3a0187d3e48d9434e20cc6b487c35c3a6263ada574125adb037242ed1c58187
f3368544a6266f0fee3c4437a8144887bbad1de97be20a578c07946a8ed41b4f