banm.usossys.us
Open in
urlscan Pro
172.245.240.107
Malicious Activity!
Public Scan
Submission: On September 24 via api from CH
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 14th 2018. Valid for: 3 months.
This is the only time banm.usossys.us was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 172.245.240.107 172.245.240.107 | 36352 (AS-COLOCR...) (AS-COLOCROSSING - ColoCrossing) | |
7 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
22 | 2 |
ASN36352 (AS-COLOCROSSING - ColoCrossing, US)
PTR: 172-245-240-107-host.colocrossing.com
banm.usossys.us |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
usossys.us
banm.usossys.us |
366 KB |
7 |
office365.com
r4.res.office365.com |
705 KB |
22 | 2 |
Domain | Requested by | |
---|---|---|
15 | banm.usossys.us |
banm.usossys.us
|
7 | r4.res.office365.com |
banm.usossys.us
|
22 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
banm.usossys.us Let's Encrypt Authority X3 |
2018-09-14 - 2018-12-13 |
3 months | crt.sh |
*.res.outlook.com Microsoft IT TLS CA 5 |
2017-11-27 - 2019-11-27 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://banm.usossys.us/
Frame ID: 45D1AF8F617164BF397445185C9C19C8
Requests: 7 HTTP requests in this frame
Frame:
https://banm.usossys.us/index_files/prefetch.html
Frame ID: B6E777B1393744AA8AD54B1BA9AC8B2F
Requests: 15 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
banm.usossys.us/ |
20 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.v2.login.min.css
banm.usossys.us/index_files/ |
93 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
banm.usossys.us/index_files/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
banm.usossys.us/index_files/ |
915 B 619 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
banm.usossys.us/index_files/ |
915 B 619 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prefetch.html
banm.usossys.us/index_files/ Frame B6E7 |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
back.jpg
banm.usossys.us/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
"e;;
banm.usossys.us/ |
210 B 210 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.0.mouse.js
banm.usossys.us/index_files/ Frame B6E7 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.1.mouse.js
banm.usossys.us/index_files/ Frame B6E7 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.2.mouse.js
banm.usossys.us/index_files/ Frame B6E7 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.3.mouse.js
banm.usossys.us/index_files/ Frame B6E7 |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.png
banm.usossys.us/index_files/ Frame B6E7 |
16 KB 17 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite1.mouse.css
banm.usossys.us/index_files/ Frame B6E7 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boot.worldwide.mouse.css
banm.usossys.us/index_files/ Frame B6E7 |
227 KB 43 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B6E7 |
647 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B6E7 |
642 KB 159 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B6E7 |
645 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/16.2478.1.2588899/scripts/ Frame B6E7 |
642 KB 142 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite1.mouse.png
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/images/0/ Frame B6E7 |
16 KB 16 KB |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite1.mouse.css
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/images/0/ Frame B6E7 |
7 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
boot.worldwide.mouse.css
r4.res.office365.com/owa/prem/16.2478.1.2588899/resources/styles/0/ Frame B6E7 |
227 KB 44 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
banm.usossys.us/ | Name: OWAPF Value: p:undefined1& |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banm.usossys.us
r4.res.office365.com
172.245.240.107
2a02:26f0:6c00:28a::753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