larcoop.com
Open in
urlscan Pro
108.179.238.80
Malicious Activity!
Public Scan
Effective URL: https://larcoop.com/xfileShare/home/?sslchannel=true&sessionid=4cmtCvbrMGKZl9GHC0xIVL4ojN2SQplVBHpedAFZgpZBzGjcGQUBC...
Submission: On June 15 via api from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 3rd 2020. Valid for: a year.
This is the only time larcoop.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 108.179.238.80 108.179.238.80 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2606:4700:20:... 2606:4700:20::681a:6a0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: lar.larcoop.com
larcoop.com | |
www.larcoop.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
larcoop.com
2 redirects
larcoop.com www.larcoop.com Failed |
1 MB |
1 |
termsfeed.com
www.termsfeed.com |
32 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
8 | larcoop.com |
2 redirects
larcoop.com
|
1 | www.termsfeed.com |
larcoop.com
|
1 | www.larcoop.com |
larcoop.com
|
13 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
larcoop.com Sectigo RSA Domain Validation Secure Server CA |
2020-03-03 - 2021-03-03 |
a year | crt.sh |
termsfeed.com CloudFlare Inc ECC CA-2 |
2019-08-28 - 2020-08-27 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://larcoop.com/xfileShare/home/?sslchannel=true&sessionid=4cmtCvbrMGKZl9GHC0xIVL4ojN2SQplVBHpedAFZgpZBzGjcGQUBCY0VM2ODr9y3RXh4xW4Ol3pUJJ6p
Frame ID: B5C6E3BF37511D4F86AE2F1ED01AD63C
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://larcoop.com/xfileShare
HTTP 301
https://larcoop.com/xfileShare/ Page URL
- https://larcoop.com/xfileShare/home/?sslchannel=true&sessionid=4cmtCvbrMGKZl9GHC0xIVL4ojN2SQplVB... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Microsoft
Search URL Search Domain Scan URL
Title: Confidentiality
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://larcoop.com/xfileShare
HTTP 301
https://larcoop.com/xfileShare/ Page URL
- https://larcoop.com/xfileShare/home/?sslchannel=true&sessionid=4cmtCvbrMGKZl9GHC0xIVL4ojN2SQplVBHpedAFZgpZBzGjcGQUBCY0VM2ODr9y3RXh4xW4Ol3pUJJ6p Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://larcoop.com/xfileShare HTTP 301
- https://larcoop.com/xfileShare/
- https://larcoop.com/xfileShare/home/ola_disc/initLoginPage.pack.4f6cb08d43a53d53c533a128533657c3.js.t%C3%A9l%C3%A9chargement HTTP 301
- https://www.larcoop.com/xfileShare/home/ola_disc/initLoginPage.pack.4f6cb08d43a53d53c533a128533657c3.js.t%C3%A9l%C3%A9chargement
- https://larcoop.com/xfileShare/home/img/security/default.png HTTP 301
- https://www.larcoop.com/xfileShare/home/img/security/default.png
- https://larcoop.com/xfileShare/home/font/montserrat-light-webfont.woff HTTP 301
- https://www.larcoop.com/xfileShare/home/font/montserrat-light-webfont.woff
- https://larcoop.com/xfileShare/home/font/montserrat-regular-webfont.woff HTTP 301
- https://www.larcoop.com/xfileShare/home/font/montserrat-regular-webfont.woff
- https://larcoop.com/xfileShare/home/font/montserrat-regular-webfont.ttf HTTP 301
- https://www.larcoop.com/xfileShare/home/font/montserrat-regular-webfont.ttf
- https://larcoop.com/xfileShare/home/font/montserrat-light-webfont.ttf HTTP 301
- https://www.larcoop.com/xfileShare/home/font/montserrat-light-webfont.ttf
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
larcoop.com/xfileShare/ Redirect Chain
|
201 B 459 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
/
larcoop.com/xfileShare/home/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
okta-sign-in.min.js
larcoop.com/xfileShare/FUNC/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
okta-sign-in.min.css
larcoop.com/xfileShare/home/ola_disc/ |
182 KB 182 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginpage-theme.7138a0eb969c6a25c2d39004ad54df8a.css
larcoop.com/xfileShare/home/ola_disc/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
initLoginPage.pack.4f6cb08d43a53d53c533a128533657c3.js.t%C3%A9l%C3%A9chargement
www.larcoop.com/xfileShare/home/ola_disc/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clipart1110398.png
larcoop.com/xfileShare/home/ola_disc/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cookie-consent.js
www.termsfeed.com/public/cookie-consent/3.1.0/ |
119 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.png
www.larcoop.com/xfileShare/home/img/security/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
montserrat-light-webfont.woff
www.larcoop.com/xfileShare/home/font/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
montserrat-regular-webfont.woff
www.larcoop.com/xfileShare/home/font/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
montserrat-regular-webfont.ttf
www.larcoop.com/xfileShare/home/font/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
montserrat-light-webfont.ttf
www.larcoop.com/xfileShare/home/font/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.larcoop.com
- URL
- https://www.larcoop.com/xfileShare/home/ola_disc/initLoginPage.pack.4f6cb08d43a53d53c533a128533657c3.js.t%C3%A9l%C3%A9chargement
- Domain
- www.larcoop.com
- URL
- https://www.larcoop.com/xfileShare/home/font/montserrat-light-webfont.woff
- Domain
- www.larcoop.com
- URL
- https://www.larcoop.com/xfileShare/home/font/montserrat-regular-webfont.woff
- Domain
- www.larcoop.com
- URL
- https://www.larcoop.com/xfileShare/home/font/montserrat-regular-webfont.ttf
- Domain
- www.larcoop.com
- URL
- https://www.larcoop.com/xfileShare/home/font/montserrat-light-webfont.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| Backbone function| jQueryCourage function| OktaSignIn object| cookieconsent1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
larcoop.com/ | Name: PHPSESSID Value: bq8hm1s53r2mbomejm46ia1cu2 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
larcoop.com
www.larcoop.com
www.termsfeed.com
www.larcoop.com
108.179.238.80
2606:4700:20::681a:6a0
1425b30f81d336782c0ee0330be885b7e2fa8033d78b761e550bd865878ed89d
2f42b6ffdea92c77b06f0fe70354bd692853554d47b29dc751dad9e10a132d5e
4137e323033182b59926b8e45d04dcdb5ff7e41565bb04faf05f7f25c91b3236
447876f21cc303f0b40695e2e2ad1bd0e9290ea0aed1db45eb04cc1f2bc59836
4f901614fb7ab8c365e703c9adb96f052167331763ca4be5ae51b7030ce35a59
8e90a8dd5b10d5fd20df763f5bd54098f15c400844a08b1211322dec375a95b8
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f785f5556c21cf194c575f6e70688fdf527de0efdba9aed9c004f2f40010b2b3