login.loadingmail.gq
Open in
urlscan Pro
111.90.146.189
Malicious Activity!
Public Scan
Effective URL: https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3...
Submission: On October 15 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 14th 2021. Valid for: 3 months.
This is the only time login.loadingmail.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 185.206.180.167 185.206.180.167 | 205787 (PUBLICLOUD) (PUBLICLOUD) | |
3 6 | 111.90.146.189 111.90.146.189 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
2 | 20.190.159.138 20.190.159.138 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
11 | 13.107.213.60 13.107.213.60 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
16 | 3 |
ASN205787 (PUBLICLOUD, BG)
PTR: 42.http-proxy2.cloudns.net
servi.cloudns.nz |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: server1.kamon.la
login.loadingmail.gq | |
www.loadingmail.gq |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
msauth.net
aadcdn.msauth.net |
201 KB |
6 |
loadingmail.gq
3 redirects
login.loadingmail.gq www.loadingmail.gq |
352 KB |
2 |
live.com
login.live.com |
2 KB |
1 |
cloudns.nz
1 redirects
servi.cloudns.nz |
227 B |
16 | 4 |
Domain | Requested by | |
---|---|---|
11 | aadcdn.msauth.net |
login.loadingmail.gq
aadcdn.msauth.net |
5 | login.loadingmail.gq |
2 redirects
login.loadingmail.gq
aadcdn.msauth.net |
2 | login.live.com |
login.loadingmail.gq
aadcdn.msauth.net |
1 | www.loadingmail.gq | 1 redirects |
1 | servi.cloudns.nz | 1 redirects |
16 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.microsoft.com |
privacy.microsoft.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
login.loadingmail.gq R3 |
2021-10-14 - 2022-01-12 |
3 months | crt.sh |
graph.windows.net DigiCert SHA2 Secure Server CA |
2021-08-26 - 2022-08-26 |
a year | crt.sh |
aadcdn.msauth.net DigiCert SHA2 Secure Server CA |
2021-07-08 - 2022-07-08 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=637698720787215366.ODRhZWUzNjktMzdmMy00NDhlLWE3MTAtOGMxNjg3NjE2ZGY5YTE1ZDYwNjQtZTIyMy00YmY4LTkwYTctMTlkZDdlYjViM2Rm&ui_locales=de-DE&mkt=de-DE&state=xx-2HM_6qPy6ZWUGp_Av9u4Vecz1Tg3r5YMIBcgy4aWRxPl4ShciTC8Yk0wnmVBCz7UpAgd2jR_ISafFd_Q8xN-VQgO8_CI-c_WkbmBIdNt2Xzik5r_dzFvi6VUcc8GzI88-AQJitqWAmxxpePqo1bfYD3Ot0gYzBscbH2LiH3myi_1L-KhZfyS2GqP6UK2A1Y8LUXn37wT_FnBDWf-HVrY-UcNJl6tpKgWBgfUKYbQGrpCWfbm2MT8SX1vAIaTh3gOQoc6Y9TI8aPdNgIUrTw&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=6.11.0.0&sso_reload=true
Frame ID: 230C51BC2789BEB759BF3FD117696C8A
Requests: 15 HTTP requests in this frame
Frame:
https://login.live.com/Me.htm?v=3
Frame ID: 58B0884CB362E16A847C6BCC4F585BC7
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Bei Ihrem Konto anmeldenPage URL History Show full URLs
-
http://servi.cloudns.nz/Lh3hU_G7JxtIRvT7B1MvPf4pkVbP15GOyiV6Ufik1BuUh8xbUUjZ92V0m8kGKStU3NNJrizp46Ib
HTTP 301
https://login.loadingmail.gq/effuqaEi HTTP 302
https://login.loadingmail.gq/ HTTP 302
https://www.loadingmail.gq/login HTTP 302
https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&... Page URL
- https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&... Page URL
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Nutzungsbedingungen
Search URL Search Domain Scan URL
Title: Datenschutz & Cookies
Search URL Search Domain Scan URL
Title: Haftungsausschluss
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://servi.cloudns.nz/Lh3hU_G7JxtIRvT7B1MvPf4pkVbP15GOyiV6Ufik1BuUh8xbUUjZ92V0m8kGKStU3NNJrizp46Ib
HTTP 301
https://login.loadingmail.gq/effuqaEi HTTP 302
https://login.loadingmail.gq/ HTTP 302
https://www.loadingmail.gq/login HTTP 302
https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=637698720787215366.ODRhZWUzNjktMzdmMy00NDhlLWE3MTAtOGMxNjg3NjE2ZGY5YTE1ZDYwNjQtZTIyMy00YmY4LTkwYTctMTlkZDdlYjViM2Rm&ui_locales=de-DE&mkt=de-DE&state=xx-2HM_6qPy6ZWUGp_Av9u4Vecz1Tg3r5YMIBcgy4aWRxPl4ShciTC8Yk0wnmVBCz7UpAgd2jR_ISafFd_Q8xN-VQgO8_CI-c_WkbmBIdNt2Xzik5r_dzFvi6VUcc8GzI88-AQJitqWAmxxpePqo1bfYD3Ot0gYzBscbH2LiH3myi_1L-KhZfyS2GqP6UK2A1Y8LUXn37wT_FnBDWf-HVrY-UcNJl6tpKgWBgfUKYbQGrpCWfbm2MT8SX1vAIaTh3gOQoc6Y9TI8aPdNgIUrTw&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=6.11.0.0 Page URL
- https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=637698720787215366.ODRhZWUzNjktMzdmMy00NDhlLWE3MTAtOGMxNjg3NjE2ZGY5YTE1ZDYwNjQtZTIyMy00YmY4LTkwYTctMTlkZDdlYjViM2Rm&ui_locales=de-DE&mkt=de-DE&state=xx-2HM_6qPy6ZWUGp_Av9u4Vecz1Tg3r5YMIBcgy4aWRxPl4ShciTC8Yk0wnmVBCz7UpAgd2jR_ISafFd_Q8xN-VQgO8_CI-c_WkbmBIdNt2Xzik5r_dzFvi6VUcc8GzI88-AQJitqWAmxxpePqo1bfYD3Ot0gYzBscbH2LiH3myi_1L-KhZfyS2GqP6UK2A1Y8LUXn37wT_FnBDWf-HVrY-UcNJl6tpKgWBgfUKYbQGrpCWfbm2MT8SX1vAIaTh3gOQoc6Y9TI8aPdNgIUrTw&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=6.11.0.0&sso_reload=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://servi.cloudns.nz/Lh3hU_G7JxtIRvT7B1MvPf4pkVbP15GOyiV6Ufik1BuUh8xbUUjZ92V0m8kGKStU3NNJrizp46Ib HTTP 301
- https://login.loadingmail.gq/effuqaEi HTTP 302
- https://login.loadingmail.gq/ HTTP 302
- https://www.loadingmail.gq/login HTTP 302
- https://login.loadingmail.gq/common/oauth2/v2.0/authorize?client_id=4765445b-32c6-49b0-83e6-1d93765276ca&redirect_uri=https%3A%2F%2Fwww.office.com%2Flandingv2&response_type=code%20id_token&scope=openid%20profile%20https%3A%2F%2Fwww.office.com%2Fv2%2FOfficeHome.All&response_mode=form_post&nonce=637698720787215366.ODRhZWUzNjktMzdmMy00NDhlLWE3MTAtOGMxNjg3NjE2ZGY5YTE1ZDYwNjQtZTIyMy00YmY4LTkwYTctMTlkZDdlYjViM2Rm&ui_locales=de-DE&mkt=de-DE&state=xx-2HM_6qPy6ZWUGp_Av9u4Vecz1Tg3r5YMIBcgy4aWRxPl4ShciTC8Yk0wnmVBCz7UpAgd2jR_ISafFd_Q8xN-VQgO8_CI-c_WkbmBIdNt2Xzik5r_dzFvi6VUcc8GzI88-AQJitqWAmxxpePqo1bfYD3Ot0gYzBscbH2LiH3myi_1L-KhZfyS2GqP6UK2A1Y8LUXn37wT_FnBDWf-HVrY-UcNJl6tpKgWBgfUKYbQGrpCWfbm2MT8SX1vAIaTh3gOQoc6Y9TI8aPdNgIUrTw&x-client-SKU=ID_NETSTANDARD2_0&x-client-ver=6.11.0.0
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
authorize
login.loadingmail.gq/common/oauth2/v2.0/ Redirect Chain
|
147 KB 148 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
authorize
login.loadingmail.gq/common/oauth2/v2.0/ |
197 KB 199 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Me.htm
login.live.com/ |
0 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ConvergedLogin_PCore_-A2DgXfXmduBuq5UW8wZcg2.js
aadcdn.msauth.net/shared/1.0/content/js/ |
458 KB 126 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oneDs_005362965f8408780df6.js
aadcdn.msauth.net/shared/1.0/content/js/ |
62 KB 19 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged.v2.login.min_lgjnfq3xbrj5zvj5ionvww2.css
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
0 20 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ux.converged.login.strings-de.min_8yvsiypwgxi-px8l2znvqa2.js
aadcdn.msauth.net/ests/2.1/content/cdnbundles/ |
0 14 KB |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedlogin_pfetchsessionsprogress_4cdd5a3fcbb2bfaeeb01.js
aadcdn.msauth.net/shared/1.0/content/js/asyncchunk/ |
15 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
marching_ants_white_166de53471265253ab3a456defe6da23.gif
aadcdn.msauth.net/shared/1.0/content/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
marching_ants_b540a8e518037192e32c4fe58bf2dbab.gif
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
marching_ants_white_166de53471265253ab3a456defe6da23.gif
aadcdn.msauth.net/shared/1.0/content/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
marching_ants_b540a8e518037192e32c4fe58bf2dbab.gif
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 990 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
Me.htm
login.live.com/ Frame 58B0 |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
Cookie set
reportpageload
login.loadingmail.gq/common/instrumentation/ |
264 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforexrselect boolean| originAgentCluster object| $Config object| $Debug object| $Do function| $Loader object| $WebWatson function| GetString function| GetErrorString function| GetUrl object| $B object| ServerData object| webpackJsonp object| ko object| PROOF object| StringRepository boolean| __ConvergedLogin_PCore boolean| __ object| Telemetry object| telemetry_webpackJsonp boolean| __convergedlogin_pfetchsessionsprogress_4cdd5a3fcbb2bfaeeb01 function| __assign function| __extends16 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.loadingmail.gq/ | Name: HhhQ Value: e1ae79473c03c2b00e9df7c566e87fed81026464aecea4ef12a4091c7a426ebc |
|
.login.loadingmail.gq/ | Name: esctx Value: AQABAAAAAAD--DLA3VO7QrddgJg7WevrtU4jdG6aIDNf_41QzPiVbF_G4VNyuRcZk8OpqGtqjNvBBRF1KQoTLIJHVfpL2cuQu8SFAxChoxjSa67puqdTdcE9GfMCS3IdGmY7GlDutWW7rB0QzM7jZ3gPbrRqHDbpEExed6z6w8Q3hoHsQ8y9UAPHGH-2OBc0J1BHV2KDXRYgAA |
|
login.loadingmail.gq/ | Name: x-ms-gateway-slice Value: estsfd |
|
login.loadingmail.gq/ | Name: stsservicecookie Value: estsfd |
|
www.loadingmail.gq/ | Name: OH.DCAffinity Value: OH-sea |
|
www.loadingmail.gq/ | Name: OH.FLID Value: ae3ccbc9-242c-4f67-b8ed-771fd3092693 |
|
www.loadingmail.gq/ | Name: .AspNetCore.OpenIdConnect.Nonce.23RXdnEYjnLr6_6pQGljmUSD4OAgZPtMYtXcwcL-8s4zYwle0Wpt5VUPfrofeySjq-qoGaGDSlSHiOm3cNdL0xilpXTO3Yg2I78QRimyVOKfxI-vLkKPU5RtkmGQZGERFiTye_9azX0wNvwdTQjxlHlbbi6fWJ4EFaF_XUTXn5t9sDNDcApvyjTRKP3pJts2tQjz6DdEgrbu4NU3JRxOJE5g6dLLbtGeAd2VIlcJiXteEO4MIqs7GYftRyrFBF8b Value: N |
|
www.loadingmail.gq/ | Name: .AspNetCore.Correlation.OpenIdConnectV2.TT5VdyLvcIJqO0_Soyk9wT43dlpfakV4bsOaygF5_JY Value: N |
|
.loadingmail.gq/ | Name: MUID Value: 08BB97A96E986F342B6987786F656EB5 |
|
.login.loadingmail.gq/ | Name: AADSSO Value: NA|NoExtension |
|
login.loadingmail.gq/ | Name: SSOCOOKIEPULLED Value: 1 |
|
login.loadingmail.gq/ | Name: buid Value: 0.AT4AMe_N-B6jSkuT5F9XHpElWltEZUfGMrBJg-Ydk3ZSdsoBAAA.AQABAAEAAAD--DLA3VO7QrddgJg7WevrIOVFsQJhHyz9S07ttsn4VDjh5_e-M3Ub0LUp582XZwhMxC5hXmFmDuncnLkibbAGvqoy-BLUoo4VtZUIDIyhhtqmO5_453fCGipgwn7xcicgAA |
|
login.loadingmail.gq/ | Name: fpc Value: Amqih5wL0V5Ovdj6Edd0yGy8Ae7AAQAAANAG-9gOAAAA |
|
.login.loadingmail.gq/ | Name: brcap Value: 0 |
|
.login.live.com/ | Name: uaid Value: 4a47a04a8c9e4bc88fcf35ea970b5814 |
|
.login.live.com/ | Name: MSPRequ Value: id=N<=1634275281&co=2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msauth.net
login.live.com
login.loadingmail.gq
servi.cloudns.nz
www.loadingmail.gq
111.90.146.189
13.107.213.60
185.206.180.167
20.190.159.138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