login.auth.msservicesyazonauth.spb.ru
Open in
urlscan Pro
103.136.212.123
Malicious Activity!
Public Scan
Effective URL: https://login.auth.msservicesyazonauth.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115...
Submission: On January 13 via api from BE — Scanned from NL
Summary
TLS certificate: Issued by R3 on January 13th 2022. Valid for: 3 months.
This is the only time login.auth.msservicesyazonauth.spb.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a03:2880:f02... 2a03:2880:f02d:5:face:b00c:0:8c | 32934 (FACEBOOK) (FACEBOOK) | |
1 | 62.182.82.232 62.182.82.232 | 30860 (YURTEH-AS) (YURTEH-AS) | |
1 | 103.136.212.123 103.136.212.123 | 140224 (WSCLOUDX-...) (WSCLOUDX-AS-AP White-Sand Cloud ComputingHK Co.) | |
2 | 3 |
ASN30860 (YURTEH-AS, UA)
PTR: host232.webfency.com
www.88.69.nathliaam.msk.ru |
ASN140224 (WSCLOUDX-AS-AP White-Sand Cloud ComputingHK Co., LIMITED, HK)
login.auth.msservicesyazonauth.spb.ru |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
spb.ru
login.auth.msservicesyazonauth.spb.ru |
19 KB |
1 |
msk.ru
www.88.69.nathliaam.msk.ru |
8 KB |
1 |
atdmt.com
1 redirects
ad.atdmt.com — Cisco Umbrella Rank: 2070 |
975 B |
2 | 3 |
Domain | Requested by | |
---|---|---|
1 | login.auth.msservicesyazonauth.spb.ru | |
1 | www.88.69.nathliaam.msk.ru | |
1 | ad.atdmt.com | 1 redirects |
2 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
go.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
login.auth.msservicesyazonauth.spb.ru R3 |
2022-01-13 - 2022-04-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.auth.msservicesyazonauth.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850
Frame ID: 6E8A15894893EC6BE1F31346A8413AA9
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Please Wait.Page URL History Show full URLs
-
https://ad.atdmt.com/c/img;adv=11282204253021;ec=11282204490079;c.a=23559052;p.a=268252486;a.a=45...
HTTP 302
http://www.88.69.nathliaam.msk.ru/484064/9696e666f4073656d70657266692d6465766f732e6265 Page URL
- https://login.auth.msservicesyazonauth.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796... Page URL
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Microsoft Defender for Office 365
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ad.atdmt.com/c/img;adv=11282204253021;ec=11282204490079;c.a=23559052;p.a=268252486;a.a=458453941;s.a=5902899;idfa=;idfa_lat=;aaid=;aaid_lat=;cache=;qpb=1;?h=http://www.88.69.nathliaam.msk.ru/484064/9696e666f4073656d70657266692d6465766f732e6265
HTTP 302
http://www.88.69.nathliaam.msk.ru/484064/9696e666f4073656d70657266692d6465766f732e6265 Page URL
- https://login.auth.msservicesyazonauth.spb.ru/&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://ad.atdmt.com/c/img;adv=11282204253021;ec=11282204490079;c.a=23559052;p.a=268252486;a.a=458453941;s.a=5902899;idfa=;idfa_lat=;aaid=;aaid_lat=;cache=;qpb=1;?h=http://www.88.69.nathliaam.msk.ru/484064/9696e666f4073656d70657266692d6465766f732e6265 HTTP 302
- http://www.88.69.nathliaam.msk.ru/484064/9696e666f4073656d70657266692d6465766f732e6265
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
9696e666f4073656d70657266692d6465766f732e6265
www.88.69.nathliaam.msk.ru/484064/ Redirect Chain
|
7 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
&sid=44264channel=&device=&739635&kid=3796624&biueisd=&rd=off&39635&kid=3796624codename=&url=115846d847302&c=43850
login.auth.msservicesyazonauth.spb.ru/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onsecuritypolicyviolation object| onslotchange function| load1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.auth.msservicesyazonauth.spb.ru/ | Name: lHil Value: 8846490bc571c2e34a94d652b9417b6a1da4fe505062312c394f5bbc4207f8ed |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ad.atdmt.com
login.auth.msservicesyazonauth.spb.ru
www.88.69.nathliaam.msk.ru
103.136.212.123
2a03:2880:f02d:5:face:b00c:0:8c
62.182.82.232
1d897be06939113f08ad0df073eb29b3629e1a098edd59a5495a5a34d09167ea
44df3e4da5cc6a89d7a5e060f31c99e70ce7192a31f7bef683640a73a6b9a441
9e089d1d42762965469543876a23390db31e7a9fcef9539b844db961208edd4b
a00f7ed35be5bfea9cbbdcbeca07f536d9db6fb6391ca55ad38790eecb01ffeb