indomei-rebus.net
Open in
urlscan Pro
162.144.38.197
Malicious Activity!
Public Scan
Effective URL: https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6...
Submission: On August 17 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 16th 2018. Valid for: 3 months.
This is the only time indomei-rebus.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 5 | 162.144.38.197 162.144.38.197 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
4 | 2a02:26f0:6c0... 2a02:26f0:6c00:29f::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2603:1026:208... 2603:1026:208:1::2 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation) | |
9 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 162-144-38-197.unifiedlayer.com
indomei-rebus.net |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US)
outlook.office365.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
gfx.ms
auth.gfx.ms |
301 KB |
5 |
indomei-rebus.net
3 redirects
indomei-rebus.net |
36 KB |
1 |
office365.com
outlook.office365.com |
|
9 | 3 |
Domain | Requested by | |
---|---|---|
6 | auth.gfx.ms |
indomei-rebus.net
|
5 | indomei-rebus.net |
3 redirects
indomei-rebus.net
|
1 | outlook.office365.com |
indomei-rebus.net
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
signup.live.com |
login.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
indomei-rebus.net Let's Encrypt Authority X3 |
2018-08-16 - 2018-11-14 |
3 months | crt.sh |
msagfx.live.com Microsoft IT TLS CA 4 |
2017-07-27 - 2019-07-17 |
2 years | crt.sh |
outlook.com DigiCert Cloud Services CA-1 |
2017-09-13 - 2018-09-13 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/Login.php?wa=wsignin1.0&rpsnv=13&ct=1527523723&rver=6.7.6640.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3dc3d04782-2ab8-dc60-d301-99253415a0af&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015
Frame ID: 5DA40D91BDD30910C0DB7EE084E4C99A
Requests: 8 HTTP requests in this frame
Frame:
https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Frame ID: 23BDA657F6F381A4AED516A70055A195
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25
HTTP 301
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/ HTTP 302
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f5... HTTP 301
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f5... Page URL
- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f5... Page URL
Detected technologies
OpenSSL (Web Server Extensions) ExpandDetected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Create one!
Search URL Search Domain Scan URL
Title: Terms of use
Search URL Search Domain Scan URL
Title: Privacy & cookies
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25
HTTP 301
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/ HTTP 302
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6 HTTP 301
https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/ Page URL
- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/Login.php?wa=wsignin1.0&rpsnv=13&ct=1527523723&rver=6.7.6640.0&wp=MBI_SSL&wreply=https%3a%2f%2foutlook.live.com%2fowa%2f%3fnlp%3d1%26RpsCsrfState%3dc3d04782-2ab8-dc60-d301-99253415a0af&id=292841&CBCXT=out&lw=1&fl=dob%2cflname%2cwld&cobrandid=90015 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25 HTTP 301
- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/ HTTP 302
- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6 HTTP 301
- https://indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/ Redirect Chain
|
673 B 952 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Login.php
indomei-rebus.net/!@%23%23$%5e$%25%23&%25%23&@%25/!@%23%23$%5e$%25%23&%25%23&@%25/18b9ae1606f53151ff96c20dc2ba21f6/ |
34 KB 34 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Converged_v21033.css
auth.gfx.ms/16.000.27773.2/ |
92 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo.svg
auth.gfx.ms/16.000.27773.2/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
auth.gfx.ms/16.000.27773.2/images/ |
915 B 667 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_grey.svg
auth.gfx.ms/16.000.27773.2/images/ |
0 208 B |
Image
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
prefetch.aspx
outlook.office365.com/owa/ Frame 23BD |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.jpg
auth.gfx.ms/16.000.27773.2/images/Backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small.jpg
auth.gfx.ms/16.000.27773.2/images/Backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| PROOF object| g_dtFirstByte object| g_objPageMode number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| ServerData3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
outlook.office365.com/ | Name: OWAPF Value: p:11111111&v:16.2500.10.2596764&l:mouse& |
|
outlook.office365.com/ | Name: OIDC Value: 1 |
|
outlook.office365.com/ | Name: ClientId Value: 6F647969BBC34C498418298996BB6F4C |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
indomei-rebus.net
outlook.office365.com
162.144.38.197
2603:1026:208:1::2
2a02:26f0:6c00:283::34ef
2a02:26f0:6c00:29f::34ef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