microsoft365.authwebmail.com
Open in
urlscan Pro
3.106.80.83
Malicious Activity!
Public Scan
Submission: On November 12 via automatic, source openphish — Scanned from AU
Summary
TLS certificate: Issued by Amazon on July 10th 2022. Valid for: a year.
This is the only time microsoft365.authwebmail.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 3.106.80.83 3.106.80.83 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 152.199.39.242 152.199.39.242 | 15133 (EDGECAST) (EDGECAST) | |
8 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-106-80-83.ap-southeast-2.compute.amazonaws.com
microsoft365.authwebmail.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
authwebmail.com
microsoft365.authwebmail.com |
256 KB |
2 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1075 |
3 KB |
0 |
amazonaws.com
Failed
awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com Failed |
|
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | microsoft365.authwebmail.com |
microsoft365.authwebmail.com
|
2 | aadcdn.msftauth.net |
microsoft365.authwebmail.com
|
0 | awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com Failed |
microsoft365.authwebmail.com
|
8 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
go.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
authwebmail.com Amazon |
2022-07-10 - 2023-08-09 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2022-04-01 - 2023-04-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://microsoft365.authwebmail.com/a0ed6095b7?t=Y2FtcGFpZ25HVUlEPTY4NjlhYzM5LTUzN2MtNDM1Zi1iNTgyLTk1NWE5NzkzMjVjMCZ0ZW5hbnRJRD0xYWM2ZDNhOC0xN2MxLTRjOTQtYTQ5NS04MDQ3NDRhMDBjN2UmdGFyZ2V0RW1haWw9dmljdG9yaWEuaGFsbGlnYW5AcHJvZmVzc2lvbmFsLWNhcmVycy5jby51ayZlVHlwZT1DYW5JUGhpc2gmZVVSTD1OQQ==&p=30
Frame ID: 0B02391683E1C2EE280C222918F11598
Requests: 8 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: More information
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
a0ed6095b7
microsoft365.authwebmail.com/ |
38 KB 38 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_8owwt4u-33ps0wawi7tmow2.css
microsoft365.authwebmail.com/office365code/ |
108 KB 108 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
53_8b36337037cff88c3df203bb73d58e41.png
microsoft365.authwebmail.com/office365code/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
picker_verify_code_f7ab697e65b83ce9870a4736085deeec.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
2 KB 998 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
microsoft365.authwebmail.com/lib/jquery/dist/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
49_7916a894ebde7d29c2cc29b267f1299f.jpg
microsoft365.authwebmail.com/office365code/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
caniphish-phish-response
awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com/default/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com
- URL
- https://awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com/default/caniphish-phish-response?t=Y2FtcGFpZ25HVUlEPTY4NjlhYzM5LTUzN2MtNDM1Zi1iNTgyLTk1NWE5NzkzMjVjMCZ0ZW5hbnRJRD0xYWM2ZDNhOC0xN2MxLTRjOTQtYTQ5NS04MDQ3NDRhMDBjN2UmdGFyZ2V0RW1haWw9dmljdG9yaWEuaGFsbGlnYW5AcHJvZmVzc2lvbmFsLWNhcmVycy5jby51ayZlVHlwZT1DYW5JUGhpc2gmZVVSTD1OQQ==&p=30&callback=jQuery35109783342875027132_1668258906340&_=1668258906341
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery boolean| signInCalled function| signIn function| parseQuery function| sleep string| uri function| jQuery35109783342875027132_16682589063400 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com
microsoft365.authwebmail.com
awo0vrpjg3.execute-api.ap-southeast-2.amazonaws.com
152.199.39.242
3.106.80.83
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0a0f4f581f0f0fe90d9276bf10893b153ed58f0e0a4567dd6b336f572b936223
bf55f15d0874de837f01fc008da4921204a33435d8d4bcc75a2f0cb6e8cb5277
cbb3706e65b35a43bdcfebd23b5479dc0542ca7e23197869b683d12b524472fe
d8f5ab3e00202fd3b45be1acd95d677b137064001e171bc79b06826d98f1e1d3
e4e1e65871749d18aea150643c07e0aab2057da057c6c57ec1c3c43580e1c898
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d