mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com
Open in
urlscan Pro
31.131.27.146
Malicious Activity!
Public Scan
Effective URL: https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?key=aXVxd3llaXVod2xpdWVobGlzYWx1aWRnYWxzaWR1aHNqa3piYyxqaHh6YmNqaGJ6eCxqaGNidWFnZGxpYX...
Submission: On September 03 via manual from SA
Summary
TLS certificate: Issued by COMODO RSA Domain Validation Secure S... on February 22nd 2018. Valid for: a year.
This is the only time mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Outlook Web Access (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 104.27.142.121 104.27.142.121 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 3 | 185.27.134.132 185.27.134.132 | 34119 (WILDCARD-...) (WILDCARD-AS Wildcard UK Limited) | |
2 6 | 31.131.27.146 31.131.27.146 | 56851 (VPS-UA-AS) (VPS-UA-AS) | |
6 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
grabify.link |
ASN34119 (WILDCARD-AS Wildcard UK Limited, GB)
PTR: 13213427185.ifastnet.org
webmail.mof-gov-sa.ga |
ASN56851 (VPS-UA-AS, UA)
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
connect-auth.com
2 redirects
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com |
290 KB |
3 |
mof-gov-sa.ga
1 redirects
webmail.mof-gov-sa.ga |
32 KB |
1 |
grabify.link
1 redirects
grabify.link |
706 B |
6 | 3 |
Domain | Requested by | |
---|---|---|
6 | mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com |
2 redirects
webmail.mof-gov-sa.ga
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com |
3 | webmail.mof-gov-sa.ga |
1 redirects
webmail.mof-gov-sa.ga
|
1 | grabify.link | 1 redirects |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.mof-gov-sa.ga COMODO RSA Domain Validation Secure Server CA |
2018-06-11 - 2018-09-09 |
3 months | crt.sh |
*.connect-auth.com COMODO RSA Domain Validation Secure Server CA |
2018-02-22 - 2019-02-22 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?key=aXVxd3llaXVod2xpdWVobGlzYWx1aWRnYWxzaWR1aHNqa3piYyxqaHh6YmNqaGJ6eCxqaGNidWFnZGxpYXVnc2RsaXVnc2FsaXVkZ2Fsc3VpZGdsaXVhc2dkaWF1bHNnZGxpdWFzZ2RsaXVhZ2RsaXVzYWdkbGl1YXNnZGxpdWFzZGdhaWxzdWRnYWp&uy=zZGdqYXNkZ2FzamRnamFrc2Rna3Vhd3lnb3VkZ2FvdXlkZ2x3dWdkdWxnYXd1ZGdhd2xpdWRnYWxpdXdnZGxpYXV3Z2RsdWdhd2xkaXVnYXdsaXU=
Frame ID: 48ED1E3E52B89AD1630FF2D36D837125
Requests: 8 HTTP requests in this frame
Frame:
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/chaptchaimg.php
Frame ID: BC25A9FF161803D3F1BC61AD0D92898C
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://grabify.link/63XQ7B
HTTP 301
https://webmail.mof-gov-sa.ga/DPRUbiu Page URL
-
https://webmail.mof-gov-sa.ga/DPRUbiu?i=1
HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/?id=fK8mxT4kiiJ6dBe~5bg2PG0U4w7ttiD4QA7BFinRTO25MZbWohIaqWjQUAEkCA/DLUvNtqS2... HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?id=wEX2uuRV4rCERNRrgXN7pg&dt=9VkW7MCEH7aPQeBk6piO5Q&rd=I6qGOAu9svO... HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?key=aXVxd3llaXVod2xpdWVobGlzYWx1aWRnYWxzaWR1aHNqa3piYyxqaHh6YmNqaG... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://grabify.link/63XQ7B
HTTP 301
https://webmail.mof-gov-sa.ga/DPRUbiu Page URL
-
https://webmail.mof-gov-sa.ga/DPRUbiu?i=1
HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/?id=fK8mxT4kiiJ6dBe~5bg2PG0U4w7ttiD4QA7BFinRTO25MZbWohIaqWjQUAEkCA/DLUvNtqS21ZaS1D2saN9wRp1m8Mdfh9vyAzGWt2SUxI9jOAmwf0b7SMUKcW1jVLPkdQJmHaNMOMqUrxr5KMEgGBuPgnCteaEpOLKYU8OiTqU= HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?id=wEX2uuRV4rCERNRrgXN7pg&dt=9VkW7MCEH7aPQeBk6piO5Q&rd=I6qGOAu9svOOk2Qj0RMTVfZbhDTC51ybmKld3NJhaJRBLx3AiewlyHtWlnPP5jMa HTTP 302
https://mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/index.php?key=aXVxd3llaXVod2xpdWVobGlzYWx1aWRnYWxzaWR1aHNqa3piYyxqaHh6YmNqaGJ6eCxqaGNidWFnZGxpYXVnc2RsaXVnc2FsaXVkZ2Fsc3VpZGdsaXVhc2dkaWF1bHNnZGxpdWFzZ2RsaXVhZ2RsaXVzYWdkbGl1YXNnZGxpdWFzZGdhaWxzdWRnYWp&uy=zZGdqYXNkZ2FzamRnamFrc2Rna3Vhd3lnb3VkZ2FvdXlkZ2x3dWdkdWxnYXd1ZGdhd2xpdWRnYWxpdXdnZGxpYXV3Z2RsdWdhd2xkaXVnYXdsaXU= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://grabify.link/63XQ7B HTTP 301
- https://webmail.mof-gov-sa.ga/DPRUbiu
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
DPRUbiu
webmail.mof-gov-sa.ga/ Redirect Chain
|
840 B 704 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aes.js
webmail.mof-gov-sa.ga/ |
30 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.php
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/ Redirect Chain
|
102 KB 102 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgdladbuwdliuagwidugawugd.jpg
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/MOFskajhdlaiuwhdiuhwd/ |
169 KB 169 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
33 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chaptchaimg.php
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/ Frame BC25 |
366 B 573 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
28 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
captchahdsagdkhasd.PNG
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com/MOFskajhdlaiuwhdiuhwd/ Frame BC25 |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Outlook Web Access (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
grabify.link
mail-mof-gov-sa-connect-auth-servr-asmx347347-update-cookie-ssl.connect-auth.com
webmail.mof-gov-sa.ga
104.27.142.121
185.27.134.132
31.131.27.146
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7
0cc9dfaafe08a92392434ef9b39743585e4c975770e4ae43d91769615ebac428
1029d92da3628431eb450130b9b4425110edd54046b0119a2b120631ca9717a5
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a
8c7d09a3c89d77814f291c24d6135f0f174f4377592f87738d4a1dd965522086
96a8fe6a4fea4ffe83417c6b09a2fef8a9a3894115a488ece0bb94b6f96c21d4
9be40526591da5673bc89b6e389b8fbb16e1005a8bf43983fa7f10188f45d421
b44833d3cbcf28fc87ebdeae91ad251ce4016247e474083a949399d914fa86bf
d2701c86a2a31a641520e72121749dbbabeed4b1a59aece20bbf14f9c9de82bc
e531092fa4ba0e2d54e9335617621369d4c7047a349c6540cbca7b0a37fa99d2