betterpools.mycustomerconnect.com
Open in
urlscan Pro
52.34.207.165
Malicious Activity!
Public Scan
Effective URL: https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/3e2ep7xwa8pk6px60zk396epy897kz7y7981y518p010pp7pk0237zp437k...
Submission: On October 04 via manual from SG
Summary
TLS certificate: Issued by Trustwave Organization Validation SHA... on June 25th 2019. Valid for: a year.
This is the only time betterpools.mycustomerconnect.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 152.9.170.16 152.9.170.16 | 81 (NCREN) (NCREN - MCNC) | |
1 1 | 43.242.215.229 43.242.215.229 | 18229 (CTRLS-AS-...) (CTRLS-AS-IN CtrlS Datacenters Ltd.) | |
3 4 | 52.34.207.165 52.34.207.165 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 2a02:26f0:6c0... 2a02:26f0:6c00:2bf::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 2 |
ASN81 (NCREN - MCNC, US)
PTR: my.nccu.edu
nccu.edu | |
www.nccu.edu |
ASN18229 (CTRLS-AS-IN CtrlS Datacenters Ltd., IN)
PTR: Server.aditlinux.com
aditlinux.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-34-207-165.us-west-2.compute.amazonaws.com
betterpools.mycustomerconnect.com |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
301 KB |
4 |
mycustomerconnect.com
3 redirects
betterpools.mycustomerconnect.com |
20 KB |
2 |
nccu.edu
2 redirects
nccu.edu www.nccu.edu |
744 B |
1 |
aditlinux.com
1 redirects
aditlinux.com |
293 B |
6 | 4 |
Domain | Requested by | |
---|---|---|
5 | secure.aadcdn.microsoftonline-p.com |
betterpools.mycustomerconnect.com
|
4 | betterpools.mycustomerconnect.com | 3 redirects |
1 | aditlinux.com | 1 redirects |
1 | www.nccu.edu | 1 redirects |
1 | nccu.edu | 1 redirects |
6 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.mycustomerconnect.com Trustwave Organization Validation SHA256 CA, Level 1 |
2019-06-25 - 2020-07-02 |
a year | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 4 |
2019-07-17 - 2021-07-17 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/3e2ep7xwa8pk6px60zk396epy897kz7y7981y518p010pp7pk0237zp437ky30paa3k88py3pw3kyaeaeppw8e4k0y.php?email=al.decato@henkel.com&.verify?service=mail&data:text/html;js6/main.jsp?sid=CAgbePXXjcVpfthPNgXXCcgDQZImqqTE&df=webmail126
Frame ID: 87D4610B3CDAE09BCCE4B54650FCE5C5
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://nccu.edu/leaving.cfm?destination=http%3A%2F%2Faditlinux%2Ecom%2Fal.decato%40henkel.com
HTTP 302
http://www.nccu.edu/leaving.cfm?destination=http%3A%2F%2Faditlinux%2Ecom%2Fal.decato%40henkel.com HTTP 302
http://aditlinux.com/al.decato@henkel.com HTTP 301
https://betterpools.mycustomerconnect.com/owa/?4_5x=al.decato@henkel.com HTTP 302
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a?email=al.decato@henkel.com&?auth=2&home... HTTP 301
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/?email=al.decato@henkel.com&?auth=2&hom... HTTP 302
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/3e2ep7xwa8pk6px60zk396epy897kz7y7981y51... Page URL
Detected technologies
CFML (Programming Languages) ExpandDetected patterns
- url /\.cfm(?:$|\?)/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
Adobe ColdFusion (Web Frameworks) Expand
Detected patterns
- url /\.cfm(?:$|\?)/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://nccu.edu/leaving.cfm?destination=http%3A%2F%2Faditlinux%2Ecom%2Fal.decato%40henkel.com
HTTP 302
http://www.nccu.edu/leaving.cfm?destination=http%3A%2F%2Faditlinux%2Ecom%2Fal.decato%40henkel.com HTTP 302
http://aditlinux.com/al.decato@henkel.com HTTP 301
https://betterpools.mycustomerconnect.com/owa/?4_5x=al.decato@henkel.com HTTP 302
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a?email=al.decato@henkel.com&?auth=2&home=1&from=PortalLanding&client-request-id=bcc7c79d-ad79-43ec-9c70-d12e378805d20cDovL3d3dy5hc@ HTTP 301
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/?email=al.decato@henkel.com&?auth=2&home=1&from=PortalLanding&client-request-id=bcc7c79d-ad79-43ec-9c70-d12e378805d20cDovL3d3dy5hc@ HTTP 302
https://betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/3e2ep7xwa8pk6px60zk396epy897kz7y7981y518p010pp7pk0237zp437ky30paa3k88py3pw3kyaeaeppw8e4k0y.php?email=al.decato@henkel.com&.verify?service=mail&data:text/html;js6/main.jsp?sid=CAgbePXXjcVpfthPNgXXCcgDQZImqqTE&df=webmail126 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
3e2ep7xwa8pk6px60zk396epy897kz7y7981y518p010pp7pk0237zp437ky30paa3k88py3pw3kyaeaeppw8e4k0y.php
betterpools.mycustomerconnect.com/owa/f36603b11be4ea2183ece34f50cc948a/ Redirect Chain
|
18 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.v2.login.min_b82b5b2o4zmoi2bapziquw2.css
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/cdnbundles/ |
99 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/ |
513 B 654 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| q45f51563 string| k function| validateForm function| ve3a4a69 function| v94f3390b16 function| o067887b539 function| o90465 function| l50b845189 function| q65d441c1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
betterpools.mycustomerconnect.com/ | Name: PHPSESSID Value: 511ec2f7a1b484b7ce07f5060861cc9c |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aditlinux.com
betterpools.mycustomerconnect.com
nccu.edu
secure.aadcdn.microsoftonline-p.com
www.nccu.edu
152.9.170.16
2a02:26f0:6c00:2bf::35c1
43.242.215.229
52.34.207.165
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
5e1516f30eac32f8f83706d770f913fcf5fc9b53aa0fe38867b7cf8a32988ad8
73eed72889b1748c6d84dd900690340edecefad94bed142602b23d34b5a54d3b
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea