sharepoint-files.ml
Open in
urlscan Pro
2606:4700:3036::681b:9164
Malicious Activity!
Public Scan
Effective URL: https://sharepoint-files.ml/sharepoint//login.php?cmd=login_submit&id=85f52314f5d873a3c01e6158caf7146185f52314f5d873a3c01e61...
Submission: On March 06 via manual from HK
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 5th 2020. Valid for: 7 months.
This is the only time sharepoint-files.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 169.50.73.250 169.50.73.250 | 36351 (SOFTLAYER) (SOFTLAYER) | |
1 12 | 2606:4700:303... 2606:4700:3036::681b:9164 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2 |
ASN36351 (SOFTLAYER, US)
PTR: fa.49.32a9.ip4.static.sl-reverse.com
sharepoiint.eu-gb.cf.appdomain.cloud |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
sharepoint-files.ml
1 redirects
sharepoint-files.ml |
315 KB |
2 |
appdomain.cloud
1 redirects
sharepoiint.eu-gb.cf.appdomain.cloud |
1 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
12 | sharepoint-files.ml |
1 redirects
sharepoint-files.ml
|
2 | sharepoiint.eu-gb.cf.appdomain.cloud | 1 redirects |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.eu-gb.cf.appdomain.cloud DigiCert SHA2 Secure Server CA |
2019-09-24 - 2020-09-28 |
a year | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-03-05 - 2020-10-09 |
7 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://sharepoint-files.ml/sharepoint//login.php?cmd=login_submit&id=85f52314f5d873a3c01e6158caf7146185f52314f5d873a3c01e6158caf71461&session=85f52314f5d873a3c01e6158caf7146185f52314f5d873a3c01e6158caf71461
Frame ID: 5BE441491FAA3011C0145DFBA0307C4F
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://sharepoiint.eu-gb.cf.appdomain.cloud/
HTTP 302
https://sharepoiint.eu-gb.cf.appdomain.cloud/jw1pi0vyfux04tl2juzutjk2.php?login=&13InboxLightaspxn.1774256418&fid.4.12528... Page URL
-
https://sharepoint-files.ml/sharepoint//index.php?login=
HTTP 302
https://sharepoint-files.ml/sharepoint//login.php?cmd=login_submit&id=85f52314f5d873a3c01e6158caf7146185... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sharepoiint.eu-gb.cf.appdomain.cloud/
HTTP 302
https://sharepoiint.eu-gb.cf.appdomain.cloud/jw1pi0vyfux04tl2juzutjk2.php?login=&13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&login=&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4 Page URL
-
https://sharepoint-files.ml/sharepoint//index.php?login=
HTTP 302
https://sharepoint-files.ml/sharepoint//login.php?cmd=login_submit&id=85f52314f5d873a3c01e6158caf7146185f52314f5d873a3c01e6158caf71461&session=85f52314f5d873a3c01e6158caf7146185f52314f5d873a3c01e6158caf71461 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://sharepoiint.eu-gb.cf.appdomain.cloud/ HTTP 302
- https://sharepoiint.eu-gb.cf.appdomain.cloud/jw1pi0vyfux04tl2juzutjk2.php?login=&13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&login=&loginpage=&.rand=13InboxLight.aspx?n=1774256418&fid=4
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
jw1pi0vyfux04tl2juzutjk2.php
sharepoiint.eu-gb.cf.appdomain.cloud/ Redirect Chain
|
649 B 736 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
sharepoint-files.ml/sharepoint// Redirect Chain
|
2 KB 737 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
sharepoint-files.ml/sharepoint//css/ |
118 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
sharepoint-files.ml/sharepoint//css/ |
1 KB 511 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
sharepoint-files.ml/sharepoint//css/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
sharepoint-files.ml/sharepoint//css/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
sharepoint-files.ml/sharepoint//css/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.png
sharepoint-files.ml/sharepoint//css/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
sharepoint-files.ml/sharepoint//css/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.png
sharepoint-files.ml/sharepoint//css/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.png
sharepoint-files.ml/sharepoint//css/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
sharepoint-files.ml/sharepoint//css/ |
196 KB 196 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sharepoint-files.ml/ | Name: PHPSESSID Value: 5rppfkpk0p4ua2o4ds13tmm5cj |
|
.sharepoint-files.ml/ | Name: __cfduid Value: d59d8c1382dd8585b38dcec26d56df0411583458140 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sharepoiint.eu-gb.cf.appdomain.cloud
sharepoint-files.ml
169.50.73.250
2606:4700:3036::681b:9164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