various-determining-siemens-sea.trycloudflare.com Open in urlscan Pro
104.18.0.142  Malicious Activity! Public Scan

Submitted URL: https://njr.soundestlink.com/link/617841b0d94307001ced0e73/617841b0e6ed40001bf1d9bf/0?signature=%25recipient.signature_link%2...
Effective URL: https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psando...
Submission Tags: falconsandbox
Submission: On October 26 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 3 HTTP transactions. The main IP is 104.18.0.142, located in United States and belongs to CLOUDFLARENET, US. The main domain is various-determining-siemens-sea.trycloudflare.com.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 28th 2021. Valid for: a year.
This is the only time various-determining-siemens-sea.trycloudflare.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2 185.193.18.58 35913 (DEDIPATH-LLC)
2 4 104.18.0.142 13335 (CLOUDFLAR...)
3 3
Domain Requested by
4 various-determining-siemens-sea.trycloudflare.com 2 redirects abdallakhalafalla.com.au
various-determining-siemens-sea.trycloudflare.com
2 abdallakhalafalla.com.au 1 redirects
1 njr.soundestlink.com 1 redirects
3 3

This site contains no links.

Subject Issuer Validity Valid
abdallakhalafalla.com.au
R3
2021-10-24 -
2022-01-22
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-28 -
2022-06-27
a year crt.sh

This page contains 1 frames:

Primary Page: https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
Frame ID: C1F6DF59554F005A5A47683C8046E343
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Outlook

Page URL History Show full URLs

  1. https://njr.soundestlink.com/link/617841b0d94307001ced0e73/617841b0e6ed40001bf1d9bf/0?signature=%25recipi... HTTP 302
    https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_m... Page URL
  2. https://abdallakhalafalla.com.au/great/index1.php?email=psandoval%40exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/index.php?email=psandoval@exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/index1.php?email=psandoval@exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=645... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

3
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

60 kB
Transfer

120 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://njr.soundestlink.com/link/617841b0d94307001ced0e73/617841b0e6ed40001bf1d9bf/0?signature=%25recipient.signature_link%25 HTTP 302
    https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend Page URL
  2. https://abdallakhalafalla.com.au/great/index1.php?email=psandoval%40exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/index.php?email=psandoval@exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/index1.php?email=psandoval@exelixis.com HTTP 302
    https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://njr.soundestlink.com/link/617841b0d94307001ced0e73/617841b0e6ed40001bf1d9bf/0?signature=%25recipient.signature_link%25 HTTP 302
  • https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
abdallakhalafalla.com.au/great/
Redirect Chain
  • https://njr.soundestlink.com/link/617841b0d94307001ced0e73/617841b0e6ed40001bf1d9bf/0?signature=%25recipient.signature_link%25
  • https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend
330 B
538 B
Document
General
Full URL
https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
185.193.18.58 Los Angeles, United States, ASN35913 (DEDIPATH-LLC, US),
Reverse DNS
Software
Apache /
Resource Hash

Request headers

Host
abdallakhalafalla.com.au
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Tue, 26 Oct 2021 20:51:50 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

date
Tue, 26 Oct 2021 20:51:49 GMT
content-length
0
location
https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend
x-envoy-upstream-service-time
9
via
1.1 google
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6a46909c0ca86955-FRA
Primary Request Login.php
various-determining-siemens-sea.trycloudflare.com/sweet/
Redirect Chain
  • https://abdallakhalafalla.com.au/great/index1.php?email=psandoval%40exelixis.com
  • https://various-determining-siemens-sea.trycloudflare.com/sweet/index.php?email=psandoval@exelixis.com
  • https://various-determining-siemens-sea.trycloudflare.com/sweet/index1.php?email=psandoval@exelixis.com
  • https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
43 KB
25 KB
Document
General
Full URL
https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
Requested by
Host: abdallakhalafalla.com.au
URL: https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.18.0.142 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PHP/7.3.31
Resource Hash
f90c72e9ecd985fcc88533a5dfd43a07d2af6638b4ba086b87c31cd282513922

Request headers

:method
GET
:authority
various-determining-siemens-sea.trycloudflare.com
:scheme
https
:path
/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept-language
de-DE,de;q=0.9
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://abdallakhalafalla.com.au/
accept-encoding
gzip, deflate, br
cookie
PHPSESSID=0jfte6bknmqjqid2koaffons8g
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://abdallakhalafalla.com.au/great/?utm_campaign=campaign%3A+freedom+%28607f6684b1b5330bcc43d643%29&utm_medium=email&utm_source=omnisend#psandoval%40exelixis.com

Response headers

date
Tue, 26 Oct 2021 20:51:51 GMT
content-type
text/html; charset=UTF-8
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
x-powered-by
PHP/7.3.31
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6a4690a82cc3c29a-FRA
content-encoding
gzip

Redirect headers

date
Tue, 26 Oct 2021 20:51:51 GMT
content-type
text/html; charset=UTF-8
cache-control
no-store, no-cache, must-revalidate
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
pragma
no-cache
x-powered-by
PHP/7.3.31
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
6a4690a68a61c29a-FRA
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png
segoeui-regular.ttf
various-determining-siemens-sea.trycloudflare.com/sweet/images/
55 KB
34 KB
Font
General
Full URL
https://various-determining-siemens-sea.trycloudflare.com/sweet/images/segoeui-regular.ttf
Requested by
Host: various-determining-siemens-sea.trycloudflare.com
URL: https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.18.0.142 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c147c2ec76a8ab8bd5082f1f4d3f80a43c689165cb164cdd812e44048fe38708

Request headers

sec-fetch-mode
cors
origin
https://various-determining-siemens-sea.trycloudflare.com
accept-encoding
gzip, deflate, br
accept-language
de-DE,de;q=0.9
sec-fetch-dest
font
cookie
PHPSESSID=0jfte6bknmqjqid2koaffons8g
:path
/sweet/images/segoeui-regular.ttf
pragma
no-cache
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
various-determining-siemens-sea.trycloudflare.com
referer
https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://various-determining-siemens-sea.trycloudflare.com/sweet/Login.php?websrc=59c275dc2e97dd3b896ed4ff2b82a8fd&dispatched=77&id=6452770003&email=psandoval@exelixis.com
Origin
https://various-determining-siemens-sea.trycloudflare.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Tue, 26 Oct 2021 20:51:52 GMT
content-encoding
gzip
cf-cache-status
DYNAMIC
last-modified
Mon, 07 Oct 2019 13:13:44 GMT
server
cloudflare
etag
W/"ddb8-59451d23c9200"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
font/ttf
cf-ray
6a4690a94e06c29a-FRA
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
257526b3e18469edef0487caa12d08b4ba2a9daffebc3ece45de636762471dbe

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster function| validateForm

1 Cookies

Domain/Path Name / Value
various-determining-siemens-sea.trycloudflare.com/ Name: PHPSESSID
Value: 0jfte6bknmqjqid2koaffons8g