gitsending-ivdl7.ondigitalocean.app
Open in
urlscan Pro
2606:4700::6810:f44e
Malicious Activity!
Public Scan
Effective URL: https://gitsending-ivdl7.ondigitalocean.app/
Submission: On March 08 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 8th 2021. Valid for: a year.
This is the only time gitsending-ivdl7.ondigitalocean.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700::68... 2606:4700::6810:f44e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2620:1ec:a92:... 2620:1ec:a92::156 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 2 | 2603:1026:203... 2603:1026:203:8d::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2603:1026:240... 2603:1026:2404:1::1 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 192.229.221.185 192.229.221.185 | 15133 (EDGECAST) (EDGECAST) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:28a::753 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
16 | 7 |
ASN13335 (CLOUDFLARENET, US)
gitsending-ivdl7.ondigitalocean.app |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
outlook.office365.com | |
outlook.office.com |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
webshell.suite.office.com |
ASN20940 (AKAMAI-ASN1, NL)
res-1.cdn.office.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1271 |
208 KB |
3 |
office.com
www.office.com — Cisco Umbrella Rank: 2404 outlook.office.com — Cisco Umbrella Rank: 73 webshell.suite.office.com — Cisco Umbrella Rank: 456 |
4 KB |
1 |
office.net
res-1.cdn.office.net — Cisco Umbrella Rank: 483 |
68 KB |
1 |
msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 2290 |
1 KB |
1 |
office365.com
1 redirects
outlook.office365.com — Cisco Umbrella Rank: 53 |
2 KB |
1 |
ondigitalocean.app
gitsending-ivdl7.ondigitalocean.app |
12 KB |
16 | 6 |
Domain | Requested by | |
---|---|---|
10 | aadcdn.msftauth.net |
gitsending-ivdl7.ondigitalocean.app
|
1 | res-1.cdn.office.net |
webshell.suite.office.com
|
1 | logincdn.msauth.net |
gitsending-ivdl7.ondigitalocean.app
|
1 | webshell.suite.office.com |
gitsending-ivdl7.ondigitalocean.app
|
1 | outlook.office.com |
gitsending-ivdl7.ondigitalocean.app
|
1 | outlook.office365.com | 1 redirects |
1 | www.office.com |
gitsending-ivdl7.ondigitalocean.app
|
1 | gitsending-ivdl7.ondigitalocean.app | |
16 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-05-08 - 2022-05-07 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2021-05-13 - 2022-05-13 |
a year | crt.sh |
portal.office.com DigiCert Cloud Services CA-1 |
2021-09-15 - 2022-09-14 |
a year | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2021-12-22 - 2022-12-22 |
a year | crt.sh |
webshell.suite.office.com Microsoft Azure TLS Issuing CA 05 |
2021-09-09 - 2022-09-04 |
a year | crt.sh |
identitycdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-05-13 - 2022-05-13 |
a year | crt.sh |
*.res.outlook.com Microsoft RSA TLS CA 01 |
2022-02-02 - 2023-02-02 |
a year | crt.sh |
This page contains 4 frames:
Primary Page:
https://gitsending-ivdl7.ondigitalocean.app/
Frame ID: 1D65D249EA1DE42E3FE09C36E113DB20
Requests: 12 HTTP requests in this frame
Frame:
https://www.office.com/logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: DEC1E83A3A6957A10725476C287C5793
Requests: 1 HTTP requests in this frame
Frame:
https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
Frame ID: 7E441318D8A3C8C36EC3A44430E36819
Requests: 1 HTTP requests in this frame
Frame:
https://webshell.suite.office.com/iframe/TokenFactoryIframe/Logout?sid=494fe386-9fa1-4fbf-885f-5038fa243363
Frame ID: F2943C1A98839FB15C6D237FB57737A0
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Sign outPage URL History Show full URLs
-
http://gitsending-ivdl7.ondigitalocean.app/
HTTP 307
https://gitsending-ivdl7.ondigitalocean.app/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://gitsending-ivdl7.ondigitalocean.app/
HTTP 307
https://gitsending-ivdl7.ondigitalocean.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://outlook.office365.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363 HTTP 302
- https://outlook.office.com/owa/auth/logoff.aspx?cmd=logoff&exlive=1&lgtype=1&sid=494fe386-9fa1-4fbf-885f-5038fa243363&pngSites=none
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
gitsending-ivdl7.ondigitalocean.app/ Redirect Chain
|
33 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_59_uuouser7hrkmvbaz1jw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
106 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.min__yok_chwseypwbmuffnnaa2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
109 KB 38 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_ynywyfekfmsp3ljup2epra2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
176 KB 44 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_7zyesnzhfxur7eprws2m2q2.png
aadcdn.msftauth.net/ests/2.1/content/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout
www.office.com/ Frame DEC1 |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logoff.aspx
outlook.office.com/owa/auth/ Frame 7E44 Redirect Chain
|
263 B 2 KB |
Document
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logout
webshell.suite.office.com/iframe/TokenFactoryIframe/ Frame F294 |
421 B 939 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
logincdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
suiteux.shell.msaltokenfactoryiframe.be8edd5df3bdb789d3f4.js
res-1.cdn.office.net/shellux/ Frame F294 |
321 KB 68 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_7zyesnzhfxur7eprws2m2q2.png
aadcdn.msftauth.net/ests/2.1/content/images/ |
0 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
work_account_gwpgszjrdzmg9t-etotdlg2.png
aadcdn.msftauth.net/ests/2.1/content/images/ |
0 2 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
personal_account_d3k1lqya8k5_mmblgg85rq2.png
aadcdn.msftauth.net/ests/2.1/content/images/ |
0 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_59_uuouser7hrkmvbaz1jw2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 19 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.1.11.min__yok_chwseypwbmuffnnaa2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 38 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aad.login.min_ynywyfekfmsp3ljup2epra2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ |
0 44 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)59 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 function| structuredClone object| oncontextlost object| oncontextrestored object| $Config object| $Debug object| $Do function| $Loader object| $WebWatson function| GetString function| GetErrorString function| GetUrl object| $B function| $ function| jQuery object| jQuery111207300256042721445 object| MSLogin object| proxy object| ErrorCodes object| Constants object| Context object| Background object| Logo object| Instrument object| User object| tenant_info object| MSLogout object| ThirdPartyCookieStates object| PostType object| LoginOption object| TenantBranding object| users object| Tiles object| $Api object| EmailDiscovery object| Support object| Post object| StrongAuthCheck object| Util object| WindowsBrowserSso function| SetImageStatus function| ImageTimeout function| IframeTimeout function| MsaTimeout function| TryCompleteSignout function| CompleteSignout function| CompleteSignoutRender function| RenderSignoutSuccess function| RenderSignoutFailure function| WriteSignoutFailedCookie function| InitiatorRedirect object| imageStatusArray boolean| imageStatusTimeout object| updatedUsers number| msaSignoutStatus object| msaSignoutTimerId boolean| iframeStatusTimeout3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.office.com/ | Name: OH.SID Value: cd530a8f-943f-4da2-b02d-6f4a229afdbc |
|
www.office.com/ | Name: OH.DCAffinity Value: OH-weu |
|
www.office.com/ | Name: OH.FLID Value: 022f0ca6-ad61-4e9d-9483-5a2b88b066dd |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
gitsending-ivdl7.ondigitalocean.app
logincdn.msauth.net
outlook.office.com
outlook.office365.com
res-1.cdn.office.net
webshell.suite.office.com
www.office.com
152.199.23.37
192.229.221.185
2603:1026:203:8d::2
2603:1026:2404:1::1
2606:4700::6810:f44e
2620:1ec:a92::156
2a02:26f0:6c00:28a::753
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
1e3dceb93e7c252036cfcded7e108e7e2473dae923a2401a84dd7925f5a9f0ad
35cceb3348d8d50cb9d46478114cc11727f9b3e78b08fc7f07101aea4bad7d1c
4a3c3d489ffcf962a1279ebe7e1ba3582e4debffdde6ef9a0ff2b4bd839a53b9
70d26049a614c4bb84d6839af09e54c73a94ce7f5aadb0246e7be83c560d820e
7ad1ad65fa56e4154d943099b98bcf6d8dd59df30f637f1088b2c228bb5a5c79
c58496962422dc800598b5197a93acc1469a8d1912d14ea2375b902729613eaf
d4a59412b578ecd33d9fbcc8307bf1ec8310b1348e16385bd6a2d48261356926
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c
ffe453f8a00c18a5b1a91a8a28899605888a264a5ddbea1aa79d83230f67ee04