messagesstoragemailqoutaoffice.com
Open in
urlscan Pro
108.170.55.202
Malicious Activity!
Public Scan
Effective URL: https://messagesstoragemailqoutaoffice.com/office365/login.php?cmd=login_submit&id=7f90a854c86b5301405b278f48f246e57f90a854c86b5301405b278f...
Submission: On July 20 via manual from GB
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 20th 2018. Valid for: 3 months.
This is the only time messagesstoragemailqoutaoffice.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.44.64.69 52.44.64.69 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 9 | 108.170.55.202 108.170.55.202 | 20454 (SSASN2) (SSASN2 - SECURED SERVERS LLC) | |
1 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::34ef | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
9 | 2 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-44-64-69.compute-1.amazonaws.com
email.veromailer.com |
ASN20454 (SSASN2 - SECURED SERVERS LLC, US)
PTR: terminal4.veeblehosting.com
messagesstoragemailqoutaoffice.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
messagesstoragemailqoutaoffice.com
1 redirects
messagesstoragemailqoutaoffice.com |
586 KB |
1 |
gfx.ms
auth.gfx.ms |
666 B |
1 |
veromailer.com
1 redirects
email.veromailer.com |
224 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
9 | messagesstoragemailqoutaoffice.com |
1 redirects
messagesstoragemailqoutaoffice.com
|
1 | auth.gfx.ms |
messagesstoragemailqoutaoffice.com
|
1 | email.veromailer.com | 1 redirects |
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
messagesstoragemailqoutaoffice.com Let's Encrypt Authority X3 |
2018-07-20 - 2018-10-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://messagesstoragemailqoutaoffice.com/office365/login.php?cmd=login_submit&id=7f90a854c86b5301405b278f48f246e57f90a854c86b5301405b278f48f246e5&session=7f90a854c86b5301405b278f48f246e57f90a854c86b5301405b278f48f246e5
Frame ID: 8B24ABDF98BA2C4EB467C3B419DE5344
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://email.veromailer.com/c/eJxdUMGOgyAQ_Rq9NGkAtcLBQ7um2dPG657MCNOWBsVFauPfL7TZXbsJGR7z3sx7QUI_gj4PSX...
HTTP 302
https://messagesstoragemailqoutaoffice.com/office365/ HTTP 302
https://messagesstoragemailqoutaoffice.com/office365/login.php?cmd=login_submit&id=7f90a854c86b5301405b278f48f246e57f90... Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://email.veromailer.com/c/eJxdUMGOgyAQ_Rq9NGkAtcLBQ7um2dPG657MCNOWBsVFauPfL7TZXbsJGR7z3sx7QUI_gj4PSXFwKPWocfCtsj3o0KqrJ9pK26fyT4mhadrp1l1R-ih7xyVVFWSciLVuBqfBa_tY9WYH76xJdcUI5aQMldFQtnRbZ-Wh5Kw-1uQgKN8nOZnRRWuD7mF-qVghiiIHRongIsuh5DnfqV0GTAKB4sV3lSxhvHE4a7wnTGxiTlNdvB-nJNsn7BhOj9ME51C8deGOpl_25sGeTlpidA-i5yPbFQGnrups1y0KYVAwa0UIDYnPcfL_T43OxiTtAD3GOM3npkE32QHMWuaX8UF_4H0y6D26Fxb70YDH3y1r8ge2WkWK5qQU9BtwaZte
HTTP 302
https://messagesstoragemailqoutaoffice.com/office365/ HTTP 302
https://messagesstoragemailqoutaoffice.com/office365/login.php?cmd=login_submit&id=7f90a854c86b5301405b278f48f246e57f90a854c86b5301405b278f48f246e5&session=7f90a854c86b5301405b278f48f246e57f90a854c86b5301405b278f48f246e5 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
messagesstoragemailqoutaoffice.com/office365/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
conv.min.css
messagesstoragemailqoutaoffice.com/office365/css/ |
18 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lofo.png
messagesstoragemailqoutaoffice.com/office365/images/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m6.png
messagesstoragemailqoutaoffice.com/office365/images/ |
642 B 683 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m7.png
messagesstoragemailqoutaoffice.com/office365/images/ |
500 B 540 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
continue.png
messagesstoragemailqoutaoffice.com/office365/images/ |
603 B 644 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ellipsis_white.svg
auth.gfx.ms/16.000.27650.1/images/ |
915 B 666 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
t1.jpg
messagesstoragemailqoutaoffice.com/office365/images/ |
566 KB 567 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
small.jpg
messagesstoragemailqoutaoffice.com/office365/images/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
auth.gfx.ms
email.veromailer.com
messagesstoragemailqoutaoffice.com
108.170.55.202
2a02:26f0:6c00:283::34ef
52.44.64.69
0b0e8860dc323f2d3431b407330217eaa8ed3a0c022a6949fb0ba9008a5a0cff
15b4ec4a90efb8ab2a35919b12b196e44a46f9c9908cfb93f700280c5b817190
2e8e4169e06c9d9ecadc3713a33290d4d8d69c620edd12f3eaff062b96b0968b
50b31138695b5211ff37efca97f602ced31100535b64898229a7453b27518aa3
6075736ea9c281d69c4a3d78ff97bb61b9416a5809919babe5a0c5596f99aaea
6689b88e97e5847b5b3442488016e853cd3be24ca14d4a98f52f4990e5e60b29
70c65bd0e084398a87baa298c1fafa52afff402096cb350d563d309565c07e83
7764c38d71f5ee52d39f237f08b4e82b4715c73bfa0afbaee30a60b0dfd058ca
caa1d7d3c14ae4c08df39cbeddd74b35043a8c17b42004a965db51a8e9461183