pat-dc.com
Open in
urlscan Pro
208.113.187.137
Malicious Activity!
Public Scan
Effective URL: https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/ey25axay02x33a390x6k5ppaw02xkkkzp0kkx652796357w54xa4924za2k...
Submission: On April 03 via manual from FR
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 9th 2020. Valid for: 3 months.
This is the only time pat-dc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 35.164.158.196 35.164.158.196 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 52.209.33.201 52.209.33.201 | 16509 (AMAZON-02) (AMAZON-02) | |
1 2 | 2606:4700:303... 2606:4700:3034::681b:a34b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 4 | 208.113.187.137 208.113.187.137 | 26347 (DREAMHOST-AS) (DREAMHOST-AS) | |
5 | 2a02:26f0:10c... 2a02:26f0:10c:38c::35c1 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
7 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-164-158-196.us-west-2.compute.amazonaws.com
t.email1.samsung.ca |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-209-33-201.eu-west-1.compute.amazonaws.com
samsungcanada.demdex.net |
ASN26347 (DREAMHOST-AS, US)
PTR: apache2-kant.douglas.dreamhost.com
pat-dc.com |
ASN20940 (AKAMAI-ASN1, US)
secure.aadcdn.microsoftonline-p.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
microsoftonline-p.com
secure.aadcdn.microsoftonline-p.com |
301 KB |
4 |
pat-dc.com
3 redirects
pat-dc.com |
7 KB |
2 |
forexmanipulation.com
1 redirects
forexmanipulation.com |
855 B |
1 |
demdex.net
1 redirects
samsungcanada.demdex.net |
521 B |
1 |
samsung.ca
1 redirects
t.email1.samsung.ca |
766 B |
7 | 5 |
Domain | Requested by | |
---|---|---|
5 | secure.aadcdn.microsoftonline-p.com |
forexmanipulation.com
pat-dc.com |
4 | pat-dc.com |
3 redirects
forexmanipulation.com
|
2 | forexmanipulation.com | 1 redirects |
1 | samsungcanada.demdex.net | 1 redirects |
1 | t.email1.samsung.ca | 1 redirects |
7 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-02-21 - 2020-10-09 |
8 months | crt.sh |
pat-dc.com Let's Encrypt Authority X3 |
2020-03-09 - 2020-06-07 |
3 months | crt.sh |
secure.aadcdn.microsoftonline-p.com Microsoft IT TLS CA 4 |
2019-07-17 - 2021-07-17 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/ey25axay02x33a390x6k5ppaw02xkkkzp0kkx652796357w54xa4924za2k652y273965ya5py5z5z69p4zkaa7705.php?email=username@adomain.com&.verify?service=mail&data:text/html;js6/main.jsp?sid=CAgbePXXjcVpfthPNgXXCcgDQZImqqTE&df=webmail126
Frame ID: E6A584ACEE005B74D65361E6D1A3B42A
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://t.email1.samsung.ca/r/?id=ff1b346f%2C303d531%2C303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4...
HTTP 302
http://samsungcanada.demdex.net/event?d_event=click&d_cid=277342%018107023398&d_cid=404221%018107023398&c_em... HTTP 302
http://forexmanipulation.com/ HTTP 301
https://forexmanipulation.com/ Page URL
-
https://pat-dc.com/ssl/?email=username%40adomain.com
HTTP 302
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62?email=username@adomain.com&?auth=2&home... HTTP 301
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/?email=username@adomain.com&?auth=2&hom... HTTP 302
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/ey25axay02x33a390x6k5ppaw02xkkkzp0kkx65... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://t.email1.samsung.ca/r/?id=ff1b346f%2C303d531%2C303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4=http:%2F%2Fforexmanipulation.com
HTTP 302
http://samsungcanada.demdex.net/event?d_event=click&d_cid=277342%018107023398&d_cid=404221%018107023398&c_emailevent=click&c_emailcampaign=cybermonday&c_emailprogram=holiday&c_emailversion=&c_emailsubversion=&c_emaillang=english&c_emailid=DM15290&c_emailmodule=fr-x-x-viewproducts-x-x&d_rd=http%3A%2F%2Fforexmanipulation.com HTTP 302
http://forexmanipulation.com/ HTTP 301
https://forexmanipulation.com/ Page URL
-
https://pat-dc.com/ssl/?email=username%40adomain.com
HTTP 302
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62?email=username@adomain.com&?auth=2&home=1&from=PortalLanding&client-request-id=bcc7c79d-ad79-43ec-9c70-d12e378805d20cDovL3d3dy5hc@ HTTP 301
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/?email=username@adomain.com&?auth=2&home=1&from=PortalLanding&client-request-id=bcc7c79d-ad79-43ec-9c70-d12e378805d20cDovL3d3dy5hc@ HTTP 302
https://pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/ey25axay02x33a390x6k5ppaw02xkkkzp0kkx652796357w54xa4924za2k652y273965ya5py5z5z69p4zkaa7705.php?email=username@adomain.com&.verify?service=mail&data:text/html;js6/main.jsp?sid=CAgbePXXjcVpfthPNgXXCcgDQZImqqTE&df=webmail126 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://t.email1.samsung.ca/r/?id=ff1b346f%2C303d531%2C303d53e&p1=8107023398&p2=8107023398&p3=DM15290&p4=http:%2F%2Fforexmanipulation.com HTTP 302
- http://samsungcanada.demdex.net/event?d_event=click&d_cid=277342%018107023398&d_cid=404221%018107023398&c_emailevent=click&c_emailcampaign=cybermonday&c_emailprogram=holiday&c_emailversion=&c_emailsubversion=&c_emaillang=english&c_emailid=DM15290&c_emailmodule=fr-x-x-viewproducts-x-x&d_rd=http%3A%2F%2Fforexmanipulation.com HTTP 302
- http://forexmanipulation.com/ HTTP 301
- https://forexmanipulation.com/
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
forexmanipulation.com/ Redirect Chain
|
172 B 548 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
ey25axay02x33a390x6k5ppaw02xkkkzp0kkx652796357w54xa4924za2k652y273965ya5py5z5z69p4zkaa7705.php
pat-dc.com/ssl/83a01df930a28b3f25d39a3c9b315a62/ Redirect Chain
|
18 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
converged.v2.login.min_b82b5b2o4zmoi2bapziquw2.css
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/cdnbundles/ |
99 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/ |
513 B 654 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0-small_138bcee624fa04ef9b75e86211a9fe0d.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/backgrounds/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0_a5dbd4393ff6a725c7e62b61df7e72f0.jpg
secure.aadcdn.microsoftonline-p.com/ests/2.1.8358.18/content/images/backgrounds/ |
277 KB 277 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| q45f51563 string| k function| validateForm function| ve3a4a69 function| v94f3390b16 function| o067887b539 function| o90465 function| l50b845189 function| q65d441c1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
pat-dc.com/ | Name: PHPSESSID Value: 48f5826476f582ebeb2e3993774e7f95 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
forexmanipulation.com
pat-dc.com
samsungcanada.demdex.net
secure.aadcdn.microsoftonline-p.com
t.email1.samsung.ca
208.113.187.137
2606:4700:3034::681b:a34b
2a02:26f0:10c:38c::35c1
35.164.158.196
52.209.33.201
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
211a907de2da0ff4a0e90917ac8054e2f35c351180977550c26e51b4909f2beb
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
73eed72889b1748c6d84dd900690340edecefad94bed142602b23d34b5a54d3b
97a7625b971185a16c43115e7d80033da6dbe31d28f5d261cac598b9bf1ccce8
daf9462047d74a4ab851df5e045f0a8d45c7c6e6e5787aa88306bab56fbe225d
f89e908280791803bbf1f33b596ff4a2179b355a8e15ad02ebaa2b1da11127ea