sharepoint-file-drive.firebaseapp.com
Open in
urlscan Pro
199.36.158.100
Malicious Activity!
Public Scan
Submission: On July 21 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1D4 on July 10th 2023. Valid for: 3 months.
This is the only time sharepoint-file-drive.firebaseapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 199.36.158.100 199.36.158.100 | 54113 (FASTLY) (FASTLY) | |
3 | 152.199.39.242 152.199.39.242 | 15133 (EDGECAST) (EDGECAST) | |
1 | 13.107.246.46 13.107.246.46 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 13.107.9.156 13.107.9.156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 1 | 52.98.64.2 52.98.64.2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 52.98.89.130 52.98.89.130 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 52.111.240.3 52.111.240.3 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 23.44.51.66 23.44.51.66 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
10 | 7 |
ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
www.office.com | |
www.microsoft365.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-44-51-66.deploy.static.akamaitechnologies.com
res-1.cdn.office.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
office.com
www.office.com — Cisco Umbrella Rank: 4026 outlook.office.com — Cisco Umbrella Rank: 46 webshell.suite.office.com — Cisco Umbrella Rank: 295 |
4 KB |
3 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 941 |
101 KB |
1 |
office.net
res-1.cdn.office.net — Cisco Umbrella Rank: 309 |
81 KB |
1 |
microsoft365.com
www.microsoft365.com — Cisco Umbrella Rank: 3087 |
990 B |
1 |
office365.com
1 redirects
outlook.office365.com — Cisco Umbrella Rank: 27 |
3 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 3731 |
2 KB |
1 |
firebaseapp.com
sharepoint-file-drive.firebaseapp.com |
13 KB |
10 | 7 |
Domain | Requested by | |
---|---|---|
3 | aadcdn.msftauth.net |
sharepoint-file-drive.firebaseapp.com
|
1 | res-1.cdn.office.net |
webshell.suite.office.com
|
1 | www.microsoft365.com |
www.office.com
|
1 | webshell.suite.office.com |
sharepoint-file-drive.firebaseapp.com
|
1 | outlook.office.com |
sharepoint-file-drive.firebaseapp.com
|
1 | outlook.office365.com | 1 redirects |
1 | www.office.com |
sharepoint-file-drive.firebaseapp.com
|
1 | logincdn.msauth.net |
sharepoint-file-drive.firebaseapp.com
|
1 | sharepoint-file-drive.firebaseapp.com | |
10 | 9 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
firebaseapp.com GTS CA 1D4 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-01-31 - 2024-01-31 |
a year | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 02 |
2023-06-24 - 2024-06-18 |
a year | crt.sh |
portal.office.com Microsoft Azure TLS Issuing CA 05 |
2023-05-01 - 2024-04-25 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2023-05-31 - 2024-05-30 |
a year | crt.sh |
webshell.suite.office.com Microsoft Azure TLS Issuing CA 01 |
2023-06-07 - 2024-06-01 |
a year | crt.sh |
*.res.outlook.com DigiCert SHA2 Secure Server CA |
2023-04-17 - 2024-04-17 |
a year | crt.sh |
This page contains 5 frames:
Primary Page:
https://sharepoint-file-drive.firebaseapp.com/
Frame ID: 6C66AC4165F487730F192FC87DD20EEE
Requests: 5 HTTP requests in this frame
Frame:
https://www.office.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: 6CDF67027197FC551300BCD6F17602D6
Requests: 1 HTTP requests in this frame
Frame:
https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
Frame ID: C0CD1AB51C77FBDC6F7BC0DF9D81C688
Requests: 1 HTTP requests in this frame
Frame:
https://webshell.suite.office.com/iframe/TokenFactoryIframe/Logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: C4D9B81047838B048285D61935506489
Requests: 2 HTTP requests in this frame
Frame:
https://www.microsoft365.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363&from=logout
Frame ID: BB12F4486C68A8513D7982F37711C9D2
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://outlook.office365.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363 HTTP 302
- https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
sharepoint-file-drive.firebaseapp.com/ |
52 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_59_uuouser7hrkmvbaz1jw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
106 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.min__yok_chwseypwbmuffnnaa2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
109 KB 38 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_ynywyfekfmsp3ljup2epra2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
176 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.office.com/ Frame 6CDF |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logoff.aspx
outlook.office.com/owa/auth/ Frame C0CD Redirect Chain
|
263 B 2 KB |
Document
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logout
webshell.suite.office.com/iframe/TokenFactoryIframe/ Frame C4D9 |
416 B 934 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.microsoft365.com/ Frame BB12 |
1 KB 990 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
suiteux.shell.msaltokenfactoryiframe.d6ea79b4a0c6c339b320.js
res-1.cdn.office.net/shellux/ Frame C4D9 |
415 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)30 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 function| $ function| jQuery object| jQuery111200729319026732369 undefined| MSLogin undefined| proxy undefined| ErrorCodes undefined| Constants undefined| Context undefined| Background undefined| Logo undefined| Instrument undefined| User undefined| tenant_info undefined| MSLogout undefined| ThirdPartyCookieStates undefined| PostType undefined| LoginOption undefined| TenantBranding undefined| users undefined| Tiles object| $Debug object| imageStatusArray boolean| imageStatusTimeout object| updatedUsers number| msaSignoutStatus object| msaSignoutTimerId boolean| iframeStatusTimeout6 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.office.com/ | Name: OH.SID Value: f29f38d0-c7fb-4803-8897-c4c75d001e85 |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-ejp |
|
www.office.com/ | Name: OH.FLID Value: d12a1a1a-c527-4a5b-a239-e756a602e464 |
|
www.microsoft365.com/ | Name: OH.SID Value: ae4e0770-f729-46f8-95d8-0089c419289e |
|
www.microsoft365.com/ | Name: OH.DCAffinity Value: OH-ejp |
|
www.microsoft365.com/ | Name: OH.FLID Value: cd36e82f-3e0b-4da6-9111-9103b85cbea2 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
logincdn.msauth.net
outlook.office.com
outlook.office365.com
res-1.cdn.office.net
sharepoint-file-drive.firebaseapp.com
webshell.suite.office.com
www.microsoft365.com
www.office.com
13.107.246.46
13.107.9.156
152.199.39.242
199.36.158.100
23.44.51.66
52.111.240.3
52.98.64.2
52.98.89.130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