servrplusprogramme-secondary.z13.web.core.windows.net Open in urlscan Pro
13.93.168.117  Malicious Activity! Public Scan

Submitted URL: https://my.su/pojvb
Effective URL: https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098...
Submission: On October 29 via api from US

Summary

This website contacted 4 IPs in 2 countries across 5 domains to perform 4 HTTP transactions. The main IP is 13.93.168.117, located in San Jose, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US. The main domain is servrplusprogramme-secondary.z13.web.core.windows.net.
TLS certificate: Issued by Microsoft IT TLS CA 4 on April 30th 2019. Valid for: 2 years.
This is the only time servrplusprogramme-secondary.z13.web.core.windows.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:30:... 13335 (CLOUDFLAR...)
1 13.93.168.117 8075 (MICROSOFT...)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2.20.20.197 20940 (AKAMAI-ASN1)
1 2600:9000:215... 16509 (AMAZON-02)
4 4
Domain Requested by
1 d3pbdh1dmixop.cloudfront.net servrplusprogramme-secondary.z13.web.core.windows.net
1 now.symassets.com servrplusprogramme-secondary.z13.web.core.windows.net
1 www.symantec.com servrplusprogramme-secondary.z13.web.core.windows.net
1 servrplusprogramme-secondary.z13.web.core.windows.net
1 my.su 1 redirects
4 5

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 4
2019-04-30 -
2021-04-30
2 years crt.sh
www.symantec.com
DigiCert SHA2 Extended Validation Server CA
2019-09-24 -
2020-07-25
10 months crt.sh
store.norton.com
DigiCert SHA2 Extended Validation Server CA
2019-05-15 -
2020-06-28
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh

This page contains 1 frames:

Primary Page: https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
Frame ID: 078AFF1B8619658B4BE11D372128945E
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://my.su/pojvb HTTP 307
    https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d0... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Page Statistics

4
Requests

100 %
HTTPS

60 %
IPv6

5
Domains

5
Subdomains

4
IPs

2
Countries

431 kB
Transfer

429 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://my.su/pojvb HTTP 307
    https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Quarantine.html
servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/
Redirect Chain
  • https://my.su/pojvb
  • https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quara...
7 KB
8 KB
Document
General
Full URL
https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
13.93.168.117 San Jose, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
a53e66684d6f27056befafad7650e0eb544c8be424097e71e5ecdd07fa95624a

Request headers

Host
servrplusprogramme-secondary.z13.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Content-Length
7410
Content-Type
text/html
Content-MD5
gUtBrjPovbzTkAeSvhESIw==
Last-Modified
Sat, 26 Oct 2019 16:16:15 GMT
Accept-Ranges
bytes
ETag
"0x8D75A2FD3417949"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
8d0bef63-801e-009e-095e-8e7b93000000
x-ms-version
2018-03-28
Date
Tue, 29 Oct 2019 13:39:38 GMT

Redirect headers

status
307
date
Tue, 29 Oct 2019 13:39:38 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=d34bf54833cb16c80b20c5ea11ea7db761572356376; expires=Wed, 28-Oct-20 13:39:36 GMT; path=/; domain=.my.su; HttpOnly ci_session=dm3fghbco2m8igksofom128g492tecnf; expires=Tue, 29-Oct-2019 15:39:37 GMT; Max-Age=7200; path=/; HttpOnly
x-powered-by
PHP/5.6.40
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
location
https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
strict-transport-security
max-age=31536000;
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
52d58e7c1efb5952-VIE
symantec-logo-top.png
www.symantec.com/content/dam/symantec/images/common/
2 KB
3 KB
Image
General
Full URL
https://www.symantec.com/content/dam/symantec/images/common/symantec-logo-top.png
Requested by
Host: servrplusprogramme-secondary.z13.web.core.windows.net
URL: https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:194::145b , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Akamai Image Manager /
Resource Hash
5c3882329f9c08203d823e491e69f63fb7aa8f53f6f80dcc04b34b2b1a2305be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 29 Oct 2019 13:39:38 GMT
last-modified
Wed, 09 Oct 2019 23:13:20 GMT
server
Akamai Image Manager
status
200
etag
"dfb-590fc9d25a3b0"
x-serial
1598
access-control-max-age
1000
access-control-allow-methods
GET, POST
content-type
image/webp
access-control-allow-origin
*
x-check-cacheable
YES
cache-control
private, no-transform, max-age=898477
access-control-allow-headers
X-Requested-With, Content-Type, Origin, Authorization, Accept, Client-Security-Token, Accept-Encoding
content-length
2194
expires
Fri, 08 Nov 2019 23:14:15 GMT
logo_norton_91x35.png
now.symassets.com/content/dam/clp/global/images/non-product/logos/
4 KB
4 KB
Image
General
Full URL
https://now.symassets.com/content/dam/clp/global/images/non-product/logos/logo_norton_91x35.png
Requested by
Host: servrplusprogramme-secondary.z13.web.core.windows.net
URL: https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.20.20.197 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-20-20-197.deploy.static.akamaitechnologies.com
Software
Apache/2.4.29 (Unix) Communique/4.2.2 /
Resource Hash
b71c79022578a104cbce78156a019993e7cba2df8a09865a8589e3d1f8205c0d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 29 Oct 2019 13:39:38 GMT
x-content-type-options
nosniff
last-modified
Wed, 05 Sep 2018 21:31:10 GMT
server
Apache/2.4.29 (Unix) Communique/4.2.2
etag
"e0b-575267e3c4774"
status
200
content-type
image/png
access-control-allow-origin
*
accept-ranges
bytes
content-length
3595
x-xss-protection
1; mode=block
Screen%20Shot%202018-09-14%20at%203.48.42%20PM.png
d3pbdh1dmixop.cloudfront.net/spark/Blog/reasons-why-spark-makes-the-best-inbox-by-gmail-alternative/
417 KB
417 KB
Image
General
Full URL
https://d3pbdh1dmixop.cloudfront.net/spark/Blog/reasons-why-spark-makes-the-best-inbox-by-gmail-alternative/Screen%20Shot%202018-09-14%20at%203.48.42%20PM.png
Requested by
Host: servrplusprogramme-secondary.z13.web.core.windows.net
URL: https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:b600:1a:f17d:4240:21 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3af4940f346f8dabd2135647ae9f901ce2b654beb53fbd4dc81b0b0f08ad2cc3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://servrplusprogramme-secondary.z13.web.core.windows.net/09d7af8d7f98d7saf8dsa70f8ds7a8f0d7s89fd7a0f8d7s0af897ds098f7ds089f7d0sa8f7d089f7d0a89f7d087ds098f7d0sa8f7d0a98f7da08f7da08f7d0sa8/Quarantine.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 29 Oct 2019 13:38:56 GMT
via
1.1 fb8c0300277bd0137c1693d3d64ab550.cloudfront.net (CloudFront)
last-modified
Fri, 14 Sep 2018 12:49:14 GMT
server
AmazonS3
age
43
etag
"0523d1d07b0fd6582bcde6ff3fe95d68"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
content-length
426500
x-amz-cf-id
h_nEeYBk6rRinXR8cK_cQkRy_09vJTubSv2nRkxTCY68R-PbeDBPCg==

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies