login.sharepoint-drive.com
Open in
urlscan Pro
13.38.160.174
Malicious Activity!
Public Scan
Submission: On May 13 via automatic, source phishtank — Scanned from FR
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on February 13th 2023. Valid for: 8 months.
This is the only time login.sharepoint-drive.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 13.38.160.174 13.38.160.174 | 16509 (AMAZON-02) (AMAZON-02) | |
5 | 2a02:26f0:300... 2a02:26f0:3000::215:162b | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-13-38-160-174.eu-west-3.compute.amazonaws.com
login.sharepoint-drive.com |
ASN20940 (AKAMAI-ASN1, NL)
r4.res.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
office365.com
r4.res.office365.com — Cisco Umbrella Rank: 206 |
645 KB |
1 |
sharepoint-drive.com
login.sharepoint-drive.com |
264 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | r4.res.office365.com |
srcdoc
|
1 | login.sharepoint-drive.com | |
6 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset.microsoftonline.com |
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
login.sharepoint-drive.com Amazon RSA 2048 M01 |
2023-02-13 - 2023-10-21 |
8 months | crt.sh |
*.res.outlook.com DigiCert SHA2 Secure Server CA |
2023-04-17 - 2024-04-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://login.sharepoint-drive.com/?rid=kSiveYn
Frame ID: BF9D81FBE85F29E508B4DDB837AE9780
Requests: 6 HTTP requests in this frame
Frame:
https://r4.res.office365.com/owa/prem/15.20.6363.21/scripts/boot.worldwide.0.mouse.js
Frame ID: B7A2F5ECB6D28BC0EF1925819030C2D8
Requests: 5 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Title: Forgot my password
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
login.sharepoint-drive.com/ |
702 KB 264 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 5 KB |
Image
image/* |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
513 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
987 B 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.0.mouse.js
r4.res.office365.com/owa/prem/15.20.6363.21/scripts/ Frame B7A2 |
648 KB 176 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.1.mouse.js
r4.res.office365.com/owa/prem/15.20.6363.21/scripts/ Frame B7A2 |
644 KB 160 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.2.mouse.js
r4.res.office365.com/owa/prem/15.20.6363.21/scripts/ Frame B7A2 |
647 KB 166 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.worldwide.3.mouse.js
r4.res.office365.com/owa/prem/15.20.6363.21/scripts/ Frame B7A2 |
645 KB 143 KB |
Stylesheet
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite1.mouse.png
r4.res.office365.com/owa/prem/15.20.6363.21/resources/images/0/ Frame B7A2 |
132 B 336 B |
Stylesheet
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless function| savepage_ShadowLoader0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.sharepoint-drive.com
r4.res.office365.com
13.38.160.174
2a02:26f0:3000::215:162b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