tulelake.tk
Open in
urlscan Pro
192.185.138.117
Malicious Activity!
Public Scan
Effective URL: https://tulelake.tk/dfnoe/indexa.php?P=_93894574342hdfjsixaoweue5_j1489738549283781331983743fncn_Product-UserID&u_1=...
Submission: On April 24 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 20th 2020. Valid for: 3 months.
This is the only time tulelake.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 18.210.141.73 18.210.141.73 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 20.38.116.68 20.38.116.68 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 7 | 192.185.138.117 192.185.138.117 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
7 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-18-210-141-73.compute-1.amazonaws.com
slack-redir.net |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
back20202.blob.core.windows.net |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 192-185-138-117.unifiedlayer.com
tulelake.tk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
tulelake.tk
1 redirects
tulelake.tk |
319 KB |
1 |
windows.net
back20202.blob.core.windows.net |
926 B |
1 |
slack-redir.net
1 redirects
slack-redir.net |
181 B |
7 | 3 |
Domain | Requested by | |
---|---|---|
7 | tulelake.tk |
1 redirects
back20202.blob.core.windows.net
tulelake.tk |
1 | back20202.blob.core.windows.net | |
1 | slack-redir.net | 1 redirects |
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blob.core.windows.net Microsoft IT TLS CA 2 |
2020-03-03 - 2022-03-03 |
2 years | crt.sh |
tulelake.tk Let's Encrypt Authority X3 |
2020-04-20 - 2020-07-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://tulelake.tk/dfnoe/indexa.php?P=_93894574342hdfjsixaoweue5_j1489738549283781331983743fncn_Product-UserID&u_1=amrish_tandon@onecallcm.com
Frame ID: 9F8DB59EB28444C3F0CD79FECE6B1E5F
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://slack-redir.net/link?url=https%3A%2F%2Fback20202.blob.core.windows.net%2Fback20202%2FAp3dX.h...
HTTP 302
https://back20202.blob.core.windows.net/back20202/Ap3dX.html Page URL
-
https://tulelake.tk/dfnoe/?u_1=amrish_tandon@onecallcm.com
HTTP 302
https://tulelake.tk/dfnoe/indexa.php?P=_93894574342hdfjsixaoweue5_j1489738549283781331983743fncn... Page URL
Detected technologies
Microsoft HTTPAPI (Web Servers) ExpandDetected patterns
- headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://slack-redir.net/link?url=https%3A%2F%2Fback20202.blob.core.windows.net%2Fback20202%2FAp3dX.html%23amrish_tandon%40onecallcm.com
HTTP 302
https://back20202.blob.core.windows.net/back20202/Ap3dX.html Page URL
-
https://tulelake.tk/dfnoe/?u_1=amrish_tandon@onecallcm.com
HTTP 302
https://tulelake.tk/dfnoe/indexa.php?P=_93894574342hdfjsixaoweue5_j1489738549283781331983743fncn_Product-UserID&u_1=amrish_tandon@onecallcm.com Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://slack-redir.net/link?url=https%3A%2F%2Fback20202.blob.core.windows.net%2Fback20202%2FAp3dX.html%23amrish_tandon%40onecallcm.com HTTP 302
- https://back20202.blob.core.windows.net/back20202/Ap3dX.html
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Ap3dX.html
back20202.blob.core.windows.net/back20202/ Redirect Chain
|
523 B 926 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
indexa.php
tulelake.tk/dfnoe/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
tulelake.tk/dfnoe/mx/ |
86 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
tulelake.tk/dfnoe/mx/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
acc.svg
tulelake.tk/dfnoe/mx/ |
379 B 444 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-small.jpg
tulelake.tk/dfnoe/mx/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
tulelake.tk/dfnoe/mx/ |
287 KB 289 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
back20202.blob.core.windows.net
slack-redir.net
tulelake.tk
18.210.141.73
192.185.138.117
20.38.116.68
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
34d8da073f47030ee94b99d84fbe68e3345bd8aaa37ea909ff2da00238447486
6ea72f8426d2fd527f9c70e6f0ba278b13182add31364b9e5e59ef2bbe1df166
878eb57c7e8ba0593b559f2ae24b9dedd6a28735a5c40ac28b25458080ba52b8
aae5c9e5cd65fd0f755875e0bbb596d1fade904c60b2514970dd6282f167f3f3
aefa6be49d0a61962c49a045e68db8dbcfeb23095062e32431210e2667c36801
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b