URL: https://hexamech.com/owa/auth/logon.php
Submission Tags: @phish_report
Submission: On September 16 via api from FI — Scanned from FI

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 129.121.18.253, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is hexamech.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 25th 2024. Valid for: a year.
This is the only time hexamech.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 129.121.18.253 46606 (UNIFIEDLA...)
1 2
Apex Domain
Subdomains
Transfer
1 hexamech.com
hexamech.com
33 KB
1 1
Domain Requested by
1 hexamech.com
1 1

This site contains no links.

Subject Issuer Validity Valid
hexamech.com
Sectigo RSA Domain Validation Secure Server CA
2024-01-25 -
2025-02-24
a year crt.sh

This page contains 1 frames:

Primary Page: https://hexamech.com/owa/auth/logon.php
Frame ID: FA01036320AC2BAAB50A5D9F8ACD2F91
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Outlook

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

33 kB
Transfer

154 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request logon.php
hexamech.com/owa/auth/
122 KB
33 KB
Document
General
Full URL
https://hexamech.com/owa/auth/logon.php
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
129.121.18.253 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
ip-129-121-18-253.local
Software
nginx/1.21.6 /
Resource Hash
7b7e6fe3c575f64081221a5efa42fb94efe9574f79fb9acb6cc2309b88083491

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Mon, 16 Sep 2024 07:25:15 GMT
server
nginx/1.21.6
vary
Accept-Encoding
x-proxy-cache
MISS
x-server-cache
true
truncated
/
20 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
379765ab31aed2e0d3cdef473f0c2a3f0ee46391724fc7a8024e901c261cdcba

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Response headers

Content-Type
text/css
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a7c14ee84d81a536a4cd54e3a144f388f2174a4a5c409ae118ea49f0da6b4aa6

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
recommendation verbose URL: https://hexamech.com/owa/auth/logon.php
Message:
[DOM] Password field is not contained in a form: (More info: https://goo.gl/9p2vKq) %o