webmail-client-support.gq
Open in
urlscan Pro
2606:4700:3037::681f:58b9
Malicious Activity!
Public Scan
Effective URL: https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/index.php?microsoft_login_mail=1µsoft-c...
Submission: On November 04 via manual from US
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 25th 2020. Valid for: a year.
This is the only time webmail-client-support.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.0.54.120 52.0.54.120 | 14618 (AMAZON-AES) (AMAZON-AES) | |
3 | 169.62.254.82 169.62.254.82 | 36351 (SOFTLAYER) (SOFTLAYER) | |
1 8 | 2606:4700:303... 2606:4700:3037::681f:58b9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-0-54-120.compute-1.amazonaws.com
app.nutshell.com |
ASN36351 (SOFTLAYER, US)
PTR: 52.fe.3ea9.ip4.static.sl-reverse.com
email-statistics.us-south.cf.appdomain.cloud |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
webmail-client-support.gq
1 redirects
webmail-client-support.gq |
303 KB |
3 |
appdomain.cloud
email-statistics.us-south.cf.appdomain.cloud |
2 KB |
1 |
nutshell.com
1 redirects
app.nutshell.com |
352 B |
10 | 3 |
Domain | Requested by | |
---|---|---|
8 | webmail-client-support.gq |
1 redirects
webmail-client-support.gq
|
3 | email-statistics.us-south.cf.appdomain.cloud | |
1 | app.nutshell.com | 1 redirects |
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.us-south.cf.appdomain.cloud DigiCert SHA2 Secure Server CA |
2020-08-27 - 2021-09-01 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-25 - 2021-10-24 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/index.php?microsoft_login_mail=1µsoft-check-level=d8423c24f912f8c88d41e0a0a121aa73&security=adb1b4b0f05b2fcdd22f1552260ee286&email=clement.fraisse@wavestone.com&session-id=ituu88847&NhYt5565dh7738xxcefrsts&auth0=true
Frame ID: FA39528C4D275DC072A4E142C5BD2277
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://app.nutshell.com/email/click/911/327389/79f7e56ea48d150832328053c2d72369b9321211665ac9cd48564...
HTTP 302
https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
- https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
- https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
-
https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/index.php?email=clement.fraisse@wa...
HTTP 302
https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/index.php?microsoft_logi... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://app.nutshell.com/email/click/911/327389/79f7e56ea48d150832328053c2d72369b9321211665ac9cd485645fd6fc14720
HTTP 302
https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
- https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
- https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com Page URL
-
https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/index.php?email=clement.fraisse@wavestone.com
HTTP 302
https://webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/index.php?microsoft_login_mail=1µsoft-check-level=d8423c24f912f8c88d41e0a0a121aa73&security=adb1b4b0f05b2fcdd22f1552260ee286&email=clement.fraisse@wavestone.com&session-id=ituu88847&NhYt5565dh7738xxcefrsts&auth0=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://app.nutshell.com/email/click/911/327389/79f7e56ea48d150832328053c2d72369b9321211665ac9cd485645fd6fc14720 HTTP 302
- https://email-statistics.us-south.cf.appdomain.cloud/index.php?email=clement.fraisse@wavestone.com
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
email-statistics.us-south.cf.appdomain.cloud/ Redirect Chain
|
673 B 743 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
email-statistics.us-south.cf.appdomain.cloud/ |
673 B 743 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
email-statistics.us-south.cf.appdomain.cloud/ |
749 B 791 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
index.php
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/ Redirect Chain
|
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/vendor/bootstrap/css/ |
138 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft.svg
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.3.min.js
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/vendor/jquery/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/vendor/bootstrap/js/ |
50 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data.js
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/js/ |
2 KB 958 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1.jpg
webmail-client-support.gq/subscription/Premium/account/team/upgrade/microsoft/ |
237 KB 237 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| bootstrap number| counter object| email object| password1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.webmail-client-support.gq/ | Name: __cfduid Value: d395dbabb3cab46dc16335be8830db7a91604484954 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app.nutshell.com
email-statistics.us-south.cf.appdomain.cloud
webmail-client-support.gq
169.62.254.82
2606:4700:3037::681f:58b9
52.0.54.120
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
263c44467ca59350f59ceb85fdfe0e06649b9202b469342b0d901a08af9e1f53
2e5a4c625cfc0cffe9b72be8d268ed6ca427d6905da92dcb6ca05ee3b51035a6
4a3259a30daf6c595e77f78f5e7c4dff535d8fef0f673b06942d321ffb23269c
539a257052150ed30a2e16504078906c4998be9e693dcbfca4544a61911cb2ea
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
6343c00dcfd4adea3036587b3a17561176b1cb15a5f425025aa612f6ba3e655b
6b6de0d4db7876d1183a3edb47ebd3bbbf93f153f5de1ba6645049348628109a
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11