URL: http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0Accoun...
Submission: On February 26 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 107.173.103.106, located in Buffalo, United States and belongs to AS-COLOCROSSING, US. The main domain is kfzuqpsqe.ga.
This is the only time kfzuqpsqe.ga was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
2 107.173.103.106 36352 (AS-COLOCR...)
2 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
4 2
Apex Domain
Subdomains
Transfer
2 microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com
19 KB
2 kfzuqpsqe.ga
kfzuqpsqe.ga
280 KB
4 2
Domain Requested by
2 secure.aadcdn.microsoftonline-p.com kfzuqpsqe.ga
2 kfzuqpsqe.ga kfzuqpsqe.ga
4 2

This site contains links to these domains. Also see Links.

Domain
www.microsoft.com
privacy.microsoft.com
Subject Issuer Validity Valid
secure.aadcdn.microsoftonline-p.com
Microsoft IT TLS CA 4
2019-07-17 -
2021-07-17
2 years crt.sh

This page contains 1 frames:

Primary Page: http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
Frame ID: 66F9DA8AD5291727C3F8E3F39BE297A5
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

299 kB
Transfer

368 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set index.php
kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/...
3 KB
3 KB
Document
General
Full URL
http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
Protocol
HTTP/1.1
Server
107.173.103.106 Buffalo, United States, ASN36352 (AS-COLOCROSSING, US),
Reverse DNS
server.nitrogenhost.net
Software
Apache /
Resource Hash
366bc4ff4844dec70be7ebf623f3f9156ca29fcc47b78824662a399faff72809

Request headers

Host
kfzuqpsqe.ga
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 26 Feb 2020 22:51:04 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=88f9283444e475120ced14e5e5e38347; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
converged.login.min.css
secure.aadcdn.microsoftonline-p.com/ests/2.1.7444.13/content/cdnbundles/
87 KB
17 KB
Stylesheet
General
Full URL
https://secure.aadcdn.microsoftonline-p.com/ests/2.1.7444.13/content/cdnbundles/converged.login.min.css
Requested by
Host: kfzuqpsqe.ga
URL: http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:283::35c1 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
4c1ff822a902896e29ac61dee0cf044764666f4720663087922385a09d70feaa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
style

Response headers

Date
Wed, 26 Feb 2020 22:51:05 GMT
Content-Encoding
gzip
Last-Modified
Sat, 18 May 2019 15:44:50 GMT
Content-MD5
15X44tTfxFZEQ2kBDFEhXg==
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=461237
Connection
keep-alive
Content-Length
17194
microsoft_logo.png
secure.aadcdn.microsoftonline-p.com/ests/2.1.7444.13/content/images/
1 KB
1 KB
Image
General
Full URL
https://secure.aadcdn.microsoftonline-p.com/ests/2.1.7444.13/content/images/microsoft_logo.png
Requested by
Host: kfzuqpsqe.ga
URL: http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:283::35c1 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

Date
Wed, 26 Feb 2020 22:51:05 GMT
Last-Modified
Sat, 18 May 2019 15:46:50 GMT
Content-MD5
7ZyesNzhfXUr7eprWs2m2Q==
Strict-Transport-Security
max-age=31536000
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=461237
Connection
keep-alive
Content-Length
1057
0.jpg
kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/...
277 KB
277 KB
Image
General
Full URL
http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/img/0.jpg
Requested by
Host: kfzuqpsqe.ga
URL: http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
Protocol
HTTP/1.1
Server
107.173.103.106 Buffalo, United States, ASN36352 (AS-COLOCROSSING, US),
Reverse DNS
server.nitrogenhost.net
Software
Apache /
Resource Hash
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb

Request headers

Referer
http://kfzuqpsqe.ga/voice/doccssiigggnn.scrs/doccssiigggnn.scrs/okdocusign/ServiceDeskPurchasing-Equipmentced0AccountabilityBDO4j69i60j69i57jOrderSalemicrosoft601647j69i60j69i57j69i60l33666j0j7&sourceidv/office365/index.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 26 Feb 2020 22:51:05 GMT
Last-Modified
Wed, 26 Feb 2020 07:27:18 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
283351

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

1 Cookies

Domain/Path Name / Value
kfzuqpsqe.ga/ Name: PHPSESSID
Value: 88f9283444e475120ced14e5e5e38347