co365.wesharefileassociactaepayment.live
Open in
urlscan Pro
2606:4700:30::681c:377
Malicious Activity!
Public Scan
Effective URL: https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/signin.php?SIGN_IN=0f1bd3b7eb082f37897203f6727e9283&lim_session=9479c115b95bb08f...
Submission: On October 18 via manual from GB
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on October 17th 2018. Valid for: a year.
This is the only time co365.wesharefileassociactaepayment.live was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 13 | 2606:4700:30:... 2606:4700:30::681c:377 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
11 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
co365.wesharefileassociactaepayment.live |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
wesharefileassociactaepayment.live
2 redirects
co365.wesharefileassociactaepayment.live |
358 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
13 | co365.wesharefileassociactaepayment.live |
2 redirects
co365.wesharefileassociactaepayment.live
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2018-10-17 - 2019-10-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/signin.php?SIGN_IN=0f1bd3b7eb082f37897203f6727e9283&lim_session=9479c115b95bb08f86ae39617e1dc9b4f3bf1fbb
Frame ID: 0B89FA2F0785C1F38C4246DEC51ADFF8
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://co365.wesharefileassociactaepayment.live/
HTTP 302
https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ HTTP 302
https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/signin.php?SIGN_IN=0f1bd3b7eb082f37897203f6727e9283&lim_sess... Page URL
Detected technologies
Knockout.js (JavaScript Frameworks) ExpandDetected patterns
- env /^ko$/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://co365.wesharefileassociactaepayment.live/
HTTP 302
https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ HTTP 302
https://co365.wesharefileassociactaepayment.live/rash/31d8dd823a/signin.php?SIGN_IN=0f1bd3b7eb082f37897203f6727e9283&lim_session=9479c115b95bb08f86ae39617e1dc9b4f3bf1fbb Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hrd.css
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
25 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo.svg
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.png
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
240 B 331 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.min.js
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
knockout-3.4.2.js
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
59 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
CommonDiagnostics.js
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
29 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hrd.min.js
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
14 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ajax.js
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
296 B 303 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.jpg
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background-small.jpg
co365.wesharefileassociactaepayment.live/rash/31d8dd823a/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| ko function| Type function| $6 object| Sys object| Diag object| OOUI_EmailHrdv2 object| OOUI function| __extends object| HostInterface object| HrdMode function| HrdUlsHost function| Hrd object| EmailHrdPage function| ajaxObj function| ajaxReturn function| emptyElement function| next function| check function| back function| signup1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.wesharefileassociactaepayment.live/ | Name: __cfduid Value: dc4894852624fe7a72feedb71e1d7620c1539857616 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
co365.wesharefileassociactaepayment.live
2606:4700:30::681c:377
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
340009f4c8b673fcb35d1ba936050698cd90f0c76c4f8b05162f827caeb7d6ca
3ae5d8b5a2806b811378107313b19f0b05baae4b2bbe85e19e9cd223391a0fe3
4b3f3de12893d8e4171c69e74864e6755029ffa201ddb418734f9c53449edb2c
517f5cec49c0ab5dd24ed9768e38d7cab81fc301d0bb7ef5bead926b5c295374
5b4051f11de1985343afd92d8c1e8a96973f61d52f76331494c901bdaf5e9aa4
704ebbf61a49759e299dce5c3de87e00f26537ada999fdd67a882c8e0912f9ed
a6d00b96d9b4082014eb9b4fe552427e83cb923e5bc6003546fe8f5d8cc5065b
ab50358475adae73a435466c72d1a48ab124e8ae06614663716a46dce5ac8b83
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b