0erfjd.s3.ap-south-1.amazonaws.com
Open in
urlscan Pro
52.219.64.55
Malicious Activity!
Public Scan
Submission: On June 19 via automatic, source openphish
Summary
TLS certificate: Issued by DigiCert Baltimore CA-2 G2 on January 28th 2020. Valid for: a year.
This is the only time 0erfjd.s3.ap-south-1.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online) Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.219.64.55 52.219.64.55 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
3 | 2620:1ec:bdf::10 2620:1ec:bdf::10 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 152.199.23.37 152.199.23.37 | 15133 (EDGECAST) (EDGECAST) | |
8 | 5 |
ASN16509 (AMAZON-02, US)
PTR: s3-r-w.ap-south-1.amazonaws.com
0erfjd.s3.ap-south-1.amazonaws.com |
ASN20940 (AKAMAI-ASN1, EU)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
msauth.net
aadcdn.msauth.net |
3 KB |
2 |
msftauth.net
aadcdn.msftauth.net |
1 KB |
1 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
5 KB |
1 |
amazonaws.com
0erfjd.s3.ap-south-1.amazonaws.com |
163 KB |
0 |
jquery.com
Failed
code.jquery.com Failed |
|
8 | 5 |
Domain | Requested by | |
---|---|---|
3 | aadcdn.msauth.net |
0erfjd.s3.ap-south-1.amazonaws.com
|
2 | aadcdn.msftauth.net |
0erfjd.s3.ap-south-1.amazonaws.com
|
1 | secure.aadcdn.microsoftonline-p.com |
0erfjd.s3.ap-south-1.amazonaws.com
|
1 | 0erfjd.s3.ap-south-1.amazonaws.com | |
0 | code.jquery.com Failed |
0erfjd.s3.ap-south-1.amazonaws.com
|
8 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.ap-south-1.amazonaws.com DigiCert Baltimore CA-2 G2 |
2020-01-28 - 2021-04-14 |
a year | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 4 |
2019-07-17 - 2021-07-17 |
2 years | crt.sh |
aadcdn.msauth.net Microsoft IT TLS CA 5 |
2020-06-05 - 2021-06-05 |
a year | crt.sh |
aadcdn.msftauth.net Microsoft IT TLS CA 5 |
2018-11-07 - 2020-11-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://0erfjd.s3.ap-south-1.amazonaws.com/index.htm?id=a@b.c
Frame ID: 582ED248E899B9CF7C048CA41D997F8C
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers server /^AmazonS3$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.htm
0erfjd.s3.ap-south-1.amazonaws.com/ |
163 KB 163 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bannerlogo
secure.aadcdn.microsoftonline-p.com/dbd5a2dd-uymyxxfhpwrbckvwvlxle8radh6vkzaj7cwkqpqixg/appbranding/4aun5ezmztvo2lrfczne4kktzabpx-3yxcp7etgh0w0/0/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msauth.net/ests/2.1/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
documentation_bcb4d1dc4eae64f0b2b2538209d8435a.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
2 KB 756 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msftauth.net/ests/2.1/content/images/ |
513 B 668 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
177 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
242 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
364 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
351 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_white_5ac590ee72bfe06a7cecfd75b588ad73.svg
aadcdn.msauth.net/ests/2.1/content/images/ |
915 B 561 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
aadcdn.msauth.net/ests/2.1/content/images/ |
915 B 557 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
jquery-3.4.1.min.js
code.jquery.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- code.jquery.com
- URL
- https://code.jquery.com/jquery-3.4.1.min.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online) Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
0erfjd.s3.ap-south-1.amazonaws.com
aadcdn.msauth.net
aadcdn.msftauth.net
code.jquery.com
secure.aadcdn.microsoftonline-p.com
code.jquery.com
152.199.23.37
2620:1ec:bdf::10
2a02:26f0:6c00:283::35c1
52.219.64.55
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
223dbeaf95c21e29aad42c8656d9ad41dbe9497df36c95118158609625d95c53
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
4c131a74d2f424e29ffb16d2b03fec20e3f0cae46c4f0aff594cdc8ade80c3ca
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
6fead81d343f693107904c5577dfd9642bb6ec751e305860c940fdcb5e6c4ae8
91eb7001a90f9178135eede72f1c8a5300cababa4a078cb59debaa50de4b1788
a76c08e9cdc3bb87bfb57627ad8f6b46f0e5ef826cc7f046dfbaf25d7b7958ea
d613dc4685a8b5ca455177d8a317728378393611ec3b834444c69189fa697c4b
fc5c3d7d2b298a42ec44dad2d8cd227b734db966b4afa68c0254a497e805f603