ab00b0bbhyibhya.z16.web.core.windows.net Open in urlscan Pro
52.239.138.65  Malicious Activity! Public Scan

Submitted URL: https://u10381901.ct.sendgrid.net/wf/click?upn=9czBwfIWikka36LP5dNXETsI-2BUaaeBSq-2FirfrXhaHuJtOIAthhktAdRM1S1wDNeRwddQU3ZPxOoL3tP...
Effective URL: https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
Submission: On May 15 via manual from US

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 2 HTTP transactions. The main IP is 52.239.138.65, located in Dublin, Ireland and belongs to MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US. The main domain is ab00b0bbhyibhya.z16.web.core.windows.net.
TLS certificate: Issued by Microsoft IT TLS CA 1 on April 19th 2018. Valid for: 2 years.
This is the only time ab00b0bbhyibhya.z16.web.core.windows.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.118.35 11377 (SENDGRID)
1 52.239.138.65 8075 (MICROSOFT...)
1 152.199.19.160 15133 (EDGECAST)
2 3
Domain Requested by
1 ajax.aspnetcdn.com ab00b0bbhyibhya.z16.web.core.windows.net
1 ab00b0bbhyibhya.z16.web.core.windows.net
1 u10381901.ct.sendgrid.net 1 redirects
2 3

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 1
2018-04-19 -
2020-04-19
2 years crt.sh
*.vo.msecnd.net
Microsoft IT TLS CA 2
2018-03-30 -
2020-03-30
2 years crt.sh

This page contains 1 frames:

Primary Page: https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
Frame ID: 962181DFF8FC749C2ACF2F7CF62AC515
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://u10381901.ct.sendgrid.net/wf/click?upn=9czBwfIWikka36LP5dNXETsI-2BUaaeBSq-2FirfrXhaHuJtOIAthhktAdRM1S1... HTTP 302
    https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

391 kB
Transfer

709 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://u10381901.ct.sendgrid.net/wf/click?upn=9czBwfIWikka36LP5dNXETsI-2BUaaeBSq-2FirfrXhaHuJtOIAthhktAdRM1S1wDNeRwddQU3ZPxOoL3tPAzbxXEAN4IoBb-2Fc1UBLG-2FXlyDoxtO2wji-2FKrm2-2BX6QI3Cofet_IJKVztGEDlPSjrnEMXjSfBGLRmlqLRDueoZaXzIAnD9nz713lU8smWlvdMiC88i5n99CuAaCjF7Ocl-2FzCjlIQhtF5xH8Y12CXtLgJeTHpdygtZqNfWU093kbeEJ7ozcbehAipEC0FMQhIVr5d9mSMJ6O4q37Y5YSGHxu9KkZ763SmBmU-2Fve7KUp-2FO6y4E1DD-2BpcDwggKnRU6Vn9sn0Bk4Tj80fgzxr8x90sX15NWHDk-3D HTTP 302
    https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ab00b0bbhyibhya.z16.web.core.windows.net/
Redirect Chain
  • https://u10381901.ct.sendgrid.net/wf/click?upn=9czBwfIWikka36LP5dNXETsI-2BUaaeBSq-2FirfrXhaHuJtOIAthhktAdRM1S1wDNeRwddQU3ZPxOoL3tPAzbxXEAN4IoBb-2Fc1UBLG-2FXlyDoxtO2wji-2FKrm2-2BX6QI3Cofet_IJKVztGED...
  • https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
361 KB
361 KB
Document
General
Full URL
https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.138.65 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
2edb8fd8f725bd00f601afd22f5bec7d88802520dfac112ce44481d759f25fcf

Request headers

Host
ab00b0bbhyibhya.z16.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
369313
Content-Type
text/html
Last-Modified
Wed, 15 May 2019 11:04:12 GMT
Accept-Ranges
bytes
ETag
"0x8D6D9250FCAAEEB"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
5ec21464-101e-007f-5011-0b762e000000
x-ms-version
2018-03-28
Date
Wed, 15 May 2019 11:30:46 GMT

Redirect headers

Server
nginx
Date
Wed, 15 May 2019 11:30:47 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
Location
https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
X-Robots-Tag
noindex, nofollow
truncated
/
201 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e84bd743de954490cf820da506ce516ea372c71a634b90caeda103b78bd6990

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
jquery-3.3.1.min.js
ajax.aspnetcdn.com/ajax/jQuery/
85 KB
30 KB
Script
General
Full URL
https://ajax.aspnetcdn.com/ajax/jQuery/jquery-3.3.1.min.js
Requested by
Host: ab00b0bbhyibhya.z16.web.core.windows.net
URL: https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.19.160 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8E87) /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://ab00b0bbhyibhya.z16.web.core.windows.net/?username=atsdrrecordscenter@cdc.gov
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 15 May 2019 11:30:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
30394
x-xss-protection
1; mode=block
last-modified
Mon, 22 Jan 2018 19:27:49 GMT
server
ECAcc (frc/8E87)
etag
"80288516b793d31:0"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public,max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
truncated
/
61 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1799023dadb6b1c651afd0dd0b795d10baa4ab959940091c2755b3f1d69692c5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| getUrlVars function| validateEmail

0 Cookies