login-microsoftonline.website.yandexcloud.net
Open in
urlscan Pro
2a02:6b8::1da
Malicious Activity!
Public Scan
Effective URL: https://login-microsoftonline.website.yandexcloud.net/
Submission: On October 29 via manual from FR
Summary
TLS certificate: Issued by Yandex CA on October 2nd 2020. Valid for: 6 months.
This is the only time login-microsoftonline.website.yandexcloud.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 68.168.84.60 68.168.84.60 | 17378 (AS17378) (AS17378) | |
1 | 2a02:6b8::1da 2a02:6b8::1da | 13238 (YANDEX) (YANDEX) | |
9 | 162.0.236.238 162.0.236.238 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
10 | 3 |
ASN17378 (AS17378, US)
PTR: 60.84.168.68.static.dbsintl.net
www.nexxt.com |
ASN13238 (YANDEX, RU)
login-microsoftonline.website.yandexcloud.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
qteysgg.xyz
qteysgg.xyz |
56 KB |
2 |
nexxt.com
2 redirects
www.nexxt.com |
1 KB |
1 |
yandexcloud.net
login-microsoftonline.website.yandexcloud.net |
100 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
9 | qteysgg.xyz |
login-microsoftonline.website.yandexcloud.net
|
2 | www.nexxt.com | 2 redirects |
1 | login-microsoftonline.website.yandexcloud.net | |
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.website.yandexcloud.net Yandex CA |
2020-10-02 - 2021-04-02 |
6 months | crt.sh |
qteysgg.xyz cPanel, Inc. Certification Authority |
2020-10-26 - 2021-01-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://login-microsoftonline.website.yandexcloud.net/
Frame ID: 3C65C11AF6C16866F43E061AD643913F
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.nexxt.com/common/track/trackgeneral.asp?tcid=106ttid=2cid=146408910emid=18977&tv1=Unsu...
HTTP 302
https://www.nexxt.com/common/track/trackgeneral.asp?tcid=106ttid=2cid=146408910emid=18977&tv1=Unsu... HTTP 302
https://login-microsoftonline.website.yandexcloud.net/ Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- url /\.aspx?(?:$|\?)/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- url /\.aspx?(?:$|\?)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.nexxt.com/common/track/trackgeneral.asp?tcid=106ttid=2cid=146408910emid=18977&tv1=Unsubscribetl2=3Dsdtv2=30200224%2B14:08bydal=truesid=EFC4BF1A-2DD6-4735-A7FC-6285ED6C4AACintsti=&red=https:%2F%2Flogin-microsoftonline%E2%80%8B.website.yandexcloud.net%23user@domain
HTTP 302
https://www.nexxt.com/common/track/trackgeneral.asp?tcid=106ttid=2cid=146408910emid=18977&tv1=Unsubscribetl2=3Dsdtv2=30200224%2B14:08bydal=truesid=EFC4BF1A-2DD6-4735-A7FC-6285ED6C4AACintsti=&red=https:%2F%2Flogin-microsoftonline%E2%80%8B.website.yandexcloud.net%23user@domain HTTP 302
https://login-microsoftonline.website.yandexcloud.net/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
login-microsoftonline.website.yandexcloud.net/ Redirect Chain
|
694 KB 100 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
qteysgg.xyz/office%20phase%20two/lib/css/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo3.png
qteysgg.xyz/office%20phase%20two/lib/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
915 B 567 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
513 B 580 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
qteysgg.xyz/office%20phase%20two/lib/img/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
call.php
qteysgg.xyz/office%20phase%20two/ |
608 B 713 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clearbit.php
qteysgg.xyz/office%20phase%20two/ |
1 B 290 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
clearbit.php
qteysgg.xyz/office%20phase%20two/ |
1 B 290 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login-microsoftonline.website.yandexcloud.net
qteysgg.xyz
www.nexxt.com
162.0.236.238
2a02:6b8::1da
68.168.84.60
01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
a33593e9043efefbaf94d9ca220c885ce1c42dd2a7707f30ed072d7d71587da5
b5d587f6c48a9b22bbe97150249e0c0655ac1780bd273431480a22f8a5bfef6c
cb3a2c969be436de74894fc3d153ba79d0ef06eeccf43ee3fcf79e68fa7f4ea0
da1236b3d009b5078aac4e7e3e41872ce98f09333c3adddb4de75b21205e7695
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ff203f9d6bb52b2852f5ef23b93c9072a755fd75d886139518a83b0c7b487615