f0544069.xsph.ru
Open in
urlscan Pro
2a0a:2b42:25:e6b0::
Malicious Activity!
Public Scan
Submission: On May 25 via automatic, source openphish
Summary
This is the only time f0544069.xsph.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2a0a:2b42:25:... 2a0a:2b42:25:e6b0:: | 35278 (SPRINTHOST) (SPRINTHOST) | |
10 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
xsph.ru
f0544069.xsph.ru |
313 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
10 | 2 |
Domain | Requested by | |
---|---|---|
7 | f0544069.xsph.ru |
f0544069.xsph.ru
|
0 | blank Failed |
f0544069.xsph.ru
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
login.live.com |
support.microsoft.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://f0544069.xsph.ru/secure.php
Frame ID: 17C80642DCCCE0A15036FF70C782F0E4
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Lua (Programming Languages) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: ¿Olvidó su contraseña?
Search URL Search Domain Scan URL
Title: Términos de uso
Search URL Search Domain Scan URL
Title: Privacidad y cookies
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
secure.php
f0544069.xsph.ru/ |
28 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged_v23082_AZXChPIB5jI3ijrmoNll5w2.css
f0544069.xsph.ru/ |
99 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
blank
/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
blank
/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
f0544069.xsph.ru/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
f0544069.xsph.ru/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
f0544069.xsph.ru/ |
915 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
blank
/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
f0544069.xsph.ru/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
f0544069.xsph.ru/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- blank
- URL
- about:blank
- Domain
- blank
- URL
- about:blank
- Domain
- blank
- URL
- about:blank
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
f0544069.xsph.ru/ | Name: PHPSESSID Value: 6eb353cb04724465a717152319c840e7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
blank
f0544069.xsph.ru
blank
2a0a:2b42:25:e6b0::
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
97eb235cafa5525cef7437b24548fb7936968778333db62c0c661ffa8310090d
c3c75b76aab4597ff08fc5321d5ecb353472392fc121aa7a220af99e0e988fb5
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea