office365.dk2b4m08027nd.amplifyapp.com
Open in
urlscan Pro
13.226.145.39
Malicious Activity!
Public Scan
Submission: On November 05 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon on October 14th 2021. Valid for: a year.
This is the only time office365.dk2b4m08027nd.amplifyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 13.226.145.39 13.226.145.39 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 94.231.109.41 94.231.109.41 | 48854 (ZITCOM) (ZITCOM) | |
4 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-13-226-145-39.dus51.r.cloudfront.net
office365.dk2b4m08027nd.amplifyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
feen.dk
feen.dk |
831 B |
1 |
amplifyapp.com
office365.dk2b4m08027nd.amplifyapp.com |
90 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | feen.dk |
office365.dk2b4m08027nd.amplifyapp.com
|
1 | office365.dk2b4m08027nd.amplifyapp.com | |
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.dk2b4m08027nd.amplifyapp.com Amazon |
2021-10-14 - 2022-11-12 |
a year | crt.sh |
feen.dk R3 |
2021-09-29 - 2021-12-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://office365.dk2b4m08027nd.amplifyapp.com/?dg=test@test.com
Frame ID: D646D18223397A8BB7B3186F6CFBF548
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
office365.dk2b4m08027nd.amplifyapp.com/ |
403 KB 90 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
756 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
899 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
222 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
915 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
call.php
feen.dk/login/ |
637 B 707 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
clearbit.php
feen.dk/login/ |
1 B 46 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-Q050 |
clearbit.php
feen.dk/login/ |
1 B 78 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| $ function| jQuery function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
feen.dk
office365.dk2b4m08027nd.amplifyapp.com
13.226.145.39
94.231.109.41
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
3151e2b2dc84b3fa2d39131d65a01a72546f996f77924899ca66d79b92b13046
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
749f85621d92a5b31b2a377a8c385a36d48a83327dad9a8a8da93cd831b8c9a2
a39b1946b7e6064c5c7594067ada4d9785fba941756b0be27eab6b76d9682c55
b7fcd37eaafe3f08647ed072d5289eadfff6c660a26cdef31532b3fcfb4a0bb2
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e4e1e65871749d18aea150643c07e0aab2057da057c6c57ec1c3c43580e1c898
fe6b0ec9c0b9dd168a1043966bd8d75b877bfb7106d14910e91e9ae52d34ed78