Submitted URL: https://illustrateomar.net/owa/?path=jdaining@umm.edu
Effective URL: https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedir...
Submission: On May 07 via automatic, source openphish

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 162.241.67.189, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is absentomar.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on April 28th 2020. Valid for: 3 months.
This is the only time absentomar.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
2 4 162.241.67.189 46606 (UNIFIEDLA...)
2 2
Apex Domain
Subdomains
Transfer
3 absentomar.net
absentomar.net
33 KB
1 illustrateomar.net
illustrateomar.net
272 B
2 2
Domain Requested by
3 absentomar.net 1 redirects absentomar.net
1 illustrateomar.net 1 redirects
2 2

This site contains no links.

Subject Issuer Validity Valid
absentomar.net
Let's Encrypt Authority X3
2020-04-28 -
2020-07-27
3 months crt.sh

This page contains 1 frames:

Primary Page: https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
Frame ID: 3CAE7899D7C2E3162BA70463F902C38A
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://illustrateomar.net/owa/?path=jdaining@umm.edu HTTP 302
    https://absentomar.net/imgs/owa_auth/?update=jdaining@umm.edu HTTP 302
    https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

33 kB
Transfer

47 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://illustrateomar.net/owa/?path=jdaining@umm.edu HTTP 302
    https://absentomar.net/imgs/owa_auth/?update=jdaining@umm.edu HTTP 302
    https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
absentomar.net/imgs/owa_auth/owa/auth/
Redirect Chain
  • https://illustrateomar.net/owa/?path=jdaining@umm.edu
  • https://absentomar.net/imgs/owa_auth/?update=jdaining@umm.edu
  • https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
32 KB
33 KB
Document
General
Full URL
https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.67.189 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-67-189.unifiedlayer.com
Software
Apache /
Resource Hash
3c681552ed12e12830a665177943f18199f27cca56c7baf03ec9733d784db7a8

Request headers

Host
absentomar.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 May 2020 00:55:31 GMT
Server
Apache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 07 May 2020 00:55:30 GMT
Server
Apache
Location
owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6bd745cac7dd2e979f9e89dcd3c1ed3058812be0c88a06fc066360f74120b717

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
segoeui-regular.ttf
absentomar.net/Fonts/
0
199 B
Font
General
Full URL
https://absentomar.net/Fonts/segoeui-regular.ttf
Requested by
Host: absentomar.net
URL: https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.67.189 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-67-189.unifiedlayer.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://absentomar.net/imgs/owa_auth/owa/auth/?replaceCurrent=1&url=https%3a%2f%2fmail.cuchost.com%2fowa%2f%23authRedirect%3dtrue&update=jdaining@umm.edu&page=1&Cookie=0ymi9tdK7Idrx6U5s3wjU75KEsUPjO
Origin
https://absentomar.net

Response headers

Date
Thu, 07 May 2020 00:55:32 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=98
Transfer-Encoding
chunked
Content-Type
text/html;charset=utf-8

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| checkSubmit function| clkLgn function| redirectCU function| redirectKK

0 Cookies