www.militarystore.pk
Open in
urlscan Pro
2606:4700:3037::681f:5835
Malicious Activity!
Public Scan
Effective URL: https://www.militarystore.pk/wfs/Office/office/voicemail/fm0kk5y171c1nabqfdd11zde.php?K2L46L160710422818e0682770cc8615cfd882d...
Submission: On December 04 via manual from US
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 2nd 2020. Valid for: a year.
This is the only time www.militarystore.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2606:4700:303... 2606:4700:3037::681f:5835 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:a723 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:a92:... 2620:1ec:a92::156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
11 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
msftauth.net
aadcdn.msftauth.net |
458 KB |
2 |
militarystore.pk
1 redirects
www.militarystore.pk |
12 KB |
1 |
office.com
www.office.com |
|
1 |
cloudflare.com
ajax.cloudflare.com |
4 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
8 | aadcdn.msftauth.net |
www.militarystore.pk
ajax.cloudflare.com |
2 | www.militarystore.pk | 1 redirects |
1 | www.office.com |
www.militarystore.pk
|
1 | ajax.cloudflare.com |
www.militarystore.pk
|
11 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
login.live.com |
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-06-02 - 2021-06-02 |
a year | crt.sh |
ajax.cloudflare.com DigiCert ECC Secure Server CA |
2020-08-11 - 2022-08-16 |
2 years | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2020-07-09 - 2021-07-09 |
a year | crt.sh |
portal.office.com GlobalSign Organization Validation CA - SHA256 - G3 |
2020-05-29 - 2022-05-30 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.militarystore.pk/wfs/Office/office/voicemail/fm0kk5y171c1nabqfdd11zde.php?K2L46L160710422818e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd7&email=
Frame ID: BBD06C89B6897A40188ADA03E8F9C89F
Requests: 10 HTTP requests in this frame
Frame:
https://www.office.com/prefetch/prefetch
Frame ID: 84A22B5EEB7E788A18FB9386F8558562
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.militarystore.pk/wfs/Office/office/voicemail/index.php
HTTP 302
https://www.militarystore.pk/wfs/Office/office/voicemail/fm0kk5y171c1nabqfdd11zde.php?K2L46L160710422818e... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.militarystore.pk/wfs/Office/office/voicemail/index.php
HTTP 302
https://www.militarystore.pk/wfs/Office/office/voicemail/fm0kk5y171c1nabqfdd11zde.php?K2L46L160710422818e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd718e0682770cc8615cfd882d477070fd7&email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
fm0kk5y171c1nabqfdd11zde.php
www.militarystore.pk/wfs/Office/office/voicemail/ Redirect Chain
|
35 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/7089c43e/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_eihab3wwm23ia-nkvubaww2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
99 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 656 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
915 B 412 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
prefetch
www.office.com/prefetch/ Frame 84A2 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
aadcdn.msftauth.net/ests/2.1/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.pcore.min_w6aw66spuqzzcc2opvgn4g2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
567 KB 146 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-en.min_m6_6gc8vfflqvlkuqzgmpg2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
31 KB 10 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| $Debug object| $Do function| $Loader function| GetString function| GetErrorString function| GetUrl object| $B object| __cfQR function| webpackJsonp object| StringRepository object| PROOF boolean| __ boolean| __cfRLUnblockHandlers5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
outlook.office365.com/ | Name: OIDC Value: 1 |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-wuk |
|
www.office.com/ | Name: OH.SID Value: 281df47d-43d8-4afb-bed1-3b84b5dd9b94 |
|
outlook.office365.com/ | Name: ClientId Value: 20B6FF5005A84D3E8AD438C869B27096 |
|
.militarystore.pk/ | Name: __cfduid Value: d27d44ee3ed9169cfe130cb24052eb7071607104226 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
ajax.cloudflare.com
www.militarystore.pk
www.office.com
152.199.23.37
2606:4700:3037::681f:5835
2606:4700::6810:a723
2620:1ec:a92::156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