login.outlook.gptgroup.com.au
Open in
urlscan Pro
3.25.162.208
Malicious Activity!
Public Scan
Effective URL: https://login.outlook.gptgroup.com.au/login.srf?wa=wsignin1.0&rpsnv=13&ct=1602033264&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2fo...
Submission: On October 07 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 6th 2020. Valid for: 3 months.
This is the only time login.outlook.gptgroup.com.au was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 3.25.162.208 3.25.162.208 | 16509 (AMAZON-02) (AMAZON-02) | |
10 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2603:1026:207... 2603:1026:207:163::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-25-162-208.ap-southeast-2.compute.amazonaws.com
account.outlook.gptgroup.com.au | |
outlook.outlook.gptgroup.com.au | |
login.outlook.gptgroup.com.au |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
msauth.net
logincdn.msauth.net |
142 KB |
3 |
gptgroup.com.au
2 redirects
account.outlook.gptgroup.com.au outlook.outlook.gptgroup.com.au login.outlook.gptgroup.com.au |
33 KB |
1 |
office365.com
outlook.office365.com |
|
12 | 3 |
Domain | Requested by | |
---|---|---|
10 | logincdn.msauth.net |
login.outlook.gptgroup.com.au
logincdn.msauth.net |
1 | outlook.office365.com |
logincdn.msauth.net
|
1 | login.outlook.gptgroup.com.au | |
1 | outlook.outlook.gptgroup.com.au | 1 redirects |
1 | account.outlook.gptgroup.com.au | 1 redirects |
12 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
outlook.outlook.gptgroup.com.au Let's Encrypt Authority X3 |
2020-10-06 - 2021-01-04 |
3 months | crt.sh |
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2020-07-20 - 2021-07-20 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2020-07-02 - 2022-07-02 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://login.outlook.gptgroup.com.au/login.srf?wa=wsignin1.0&rpsnv=13&ct=1602033264&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d5e593a8b-1395-71ee-65f4-062be9fb7f25&id=292841&aadredir=1&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015
Frame ID: A14F8B8B3AD02CA28ED766DF1DEFD09E
Requests: 11 HTTP requests in this frame
Frame:
https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Frame ID: 285F24426EB544A035B9991A2C40753B
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://account.outlook.gptgroup.com.au/
HTTP 302
https://outlook.outlook.gptgroup.com.au/owa/?nlp=1 HTTP 302
https://login.outlook.gptgroup.com.au/login.srf?wa=wsignin1.0&rpsnv=13&ct=1602033264&rver=7.0.6737.0&wp=MBI_SSL&wr... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://account.outlook.gptgroup.com.au/
HTTP 302
https://outlook.outlook.gptgroup.com.au/owa/?nlp=1 HTTP 302
https://login.outlook.gptgroup.com.au/login.srf?wa=wsignin1.0&rpsnv=13&ct=1602033264&rver=7.0.6737.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3d5e593a8b-1395-71ee-65f4-062be9fb7f25&id=292841&aadredir=1&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.srf
login.outlook.gptgroup.com.au/ Redirect Chain
|
28 KB 29 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033_5plpI1P0_uKjrokWdqCoBw2.css
logincdn.msauth.net/16.000/ |
103 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLoginPaginatedStrings.en_B1ZHW_gchzesEhuLkh22-g2.js
logincdn.msauth.net/16.000/content/js/ |
29 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLogin_PCore_dPUlFZDruMhcATtVx_0xNw2.js
logincdn.msauth.net/shared/1.0/content/js/ |
400 KB 110 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
prefetch.aspx
outlook.office365.com/owa/ Frame 285F |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
logincdn.msauth.net/shared/1.0/content/images/ |
915 B 393 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
logincdn.msauth.net/shared/1.0/content/images/ |
915 B 392 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
logincdn.msauth.net/shared/1.0/content/images/ |
915 B 330 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
logincdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 826 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_635a63d500a92a0b8497cdc58d0f66b1.svg
logincdn.msauth.net/shared/1.0/content/images/ |
900 B 382 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
logincdn.msauth.net/shared/1.0/content/images/ |
2 KB 758 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| PROOF function| $Loader object| $Do function| $DepLoader object| g_dtFirstByte object| g_objPageMode number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| ServerData object| HIP object| UXResourceDependencies function| WhenAllLoaded object| StringRepository boolean| __ConvergedLoginPaginatedStrings object| webpackJsonp object| ko boolean| __ConvergedLogin_PCore7 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.login.outlook.gptgroup.com.au/ | Name: MSPOK Value: $uuid-042febbc-ded5-4776-898f-e66350c79f48 |
|
outlook.office365.com/ | Name: ClientId Value: 62F042FF74DC49B9A6ABDB8F4FDA949E |
|
.login.outlook.gptgroup.com.au/ | Name: OParams Value: 11DaHpfTxIxi1rSNRyDLpCB2**OXpuJoh*vymBq*vFBzfreljqgNgZbU1DaFjQbn5rzjaQHEw5WJglTqrCa3LlZ2l3xeUSbgo0TZJlc9brzqYPJvfexdXwwNQCOTsYpIxQhYeQcTTRNysUBYXsf4HFr!6JYrSUXtfO7q4b2M9maMge6ugS4rMiCTsYez6!kTZGIjRHOEq!bK1Ivr7ZeTur6RukIKH7K5dxlIq5Y*XedvwZs*W9tOIgG7PWvdd719yEnafI7yHD6oUOU!VcfDx5FnQ0!AIBju1giG!S6UovqfHk2GpNyANTvnKSW1j6jvTDAANPuhstql!3vcHSHq3niW5pdLimIHGf45yjtPU0YXx99tNFPlJD6hlz8rYx*WgggeI9ZfyCWPkl0ax3dsgdQ1c9G*BqqQ0PpeDGyR3eQdGNh6XahKvUHway0MdqFKwSK9fBF4TUkcWmDK!okzQUDKf2h!mQb9tVf2lEM5WppTH0BtEomcJ*!sYlSB1zfxIk1FJZuWatB9Sk*tmpLICiL7Y$ |
|
outlook.office365.com/ | Name: OIDC Value: 1 |
|
.login.outlook.gptgroup.com.au/ | Name: MSCC Value: 3.25.162.208-AU |
|
.login.outlook.gptgroup.com.au/ | Name: MSPRequ Value: id=292841<=1602033266&co=1 |
|
.login.outlook.gptgroup.com.au/ | Name: uaid Value: e50810d44795422ca745c001e20c6e77 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
account.outlook.gptgroup.com.au
login.outlook.gptgroup.com.au
logincdn.msauth.net
outlook.office365.com
outlook.outlook.gptgroup.com.au
192.229.221.185
2603:1026:207:163::2
3.25.162.208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