voicenotes.msoffice-mailbox.top
Open in
urlscan Pro
46.29.161.207
Malicious Activity!
Public Scan
Effective URL: https://voicenotes.msoffice-mailbox.top/voice_php/index_login.php?id=anna.logunova@lenta.com&s_details=SFI7Q292aWQxOSAtIE9mZmljZSBSZXN1b...
Submission: On September 10 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 8th 2020. Valid for: 3 months.
This is the only time voicenotes.msoffice-mailbox.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 199.192.20.103 199.192.20.103 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 46.29.161.207 46.29.161.207 | 51659 (ASBAXET) (ASBAXET) | |
2 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
lenqueteur.net
1 redirects
voice.lenqueteur.net |
862 B |
1 |
msoffice-mailbox.top
voicenotes.msoffice-mailbox.top |
85 KB |
2 | 2 |
Domain | Requested by | |
---|---|---|
2 | voice.lenqueteur.net | 1 redirects |
1 | voicenotes.msoffice-mailbox.top |
voice.lenqueteur.net
|
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
voice.lenqueteur.net Let's Encrypt Authority X3 |
2020-09-08 - 2020-12-07 |
3 months | crt.sh |
voicenotes.msoffice-mailbox.top Let's Encrypt Authority X3 |
2020-09-08 - 2020-12-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://voicenotes.msoffice-mailbox.top/voice_php/index_login.php?id=anna.logunova@lenta.com&s_details=SFI7Q292aWQxOSAtIE9mZmljZSBSZXN1bXB0aW9uKE1TMjUpLnBkZiA=&xuuid=1537f1e0-339a-4549-be1a-07b28cdbea98
Frame ID: 47D9A91AF26034A182B8C88E36140FA4
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://voice.lenqueteur.net/screen.php?New_tWfgGGT____soppdYTW_____opUtyDheGWWeQiWJDD___fhfhKLHJSfCxsD=a... Page URL
-
https://voice.lenqueteur.net/reviews.php?id=anna.logunova@lenta.com&width=1600&height=1200
HTTP 302
https://voicenotes.msoffice-mailbox.top/voice_php/index_login.php?id=anna.logunova@lenta.com&s_details=SFI7Q292aWQxO... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Ubuntu (Operating Systems) Expand
Detected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://voice.lenqueteur.net/screen.php?New_tWfgGGT____soppdYTW_____opUtyDheGWWeQiWJDD___fhfhKLHJSfCxsD=anna.logunova%40lenta.com&fCCjdhRWyryCCSXW____fjfhDFHHFhsh=SFI7SW1wLiAjOTQ5NTMgUHJvZC5wZGY%3D Page URL
-
https://voice.lenqueteur.net/reviews.php?id=anna.logunova@lenta.com&width=1600&height=1200
HTTP 302
https://voicenotes.msoffice-mailbox.top/voice_php/index_login.php?id=anna.logunova@lenta.com&s_details=SFI7Q292aWQxOSAtIE9mZmljZSBSZXN1bXB0aW9uKE1TMjUpLnBkZiA=&xuuid=1537f1e0-339a-4549-be1a-07b28cdbea98 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
screen.php
voice.lenqueteur.net/ |
337 B 443 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
index_login.php
voicenotes.msoffice-mailbox.top/voice_php/ Redirect Chain
|
144 KB 85 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
95 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| validate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
voicenotes.msoffice-mailbox.top/ | Name: PHPSESSID Value: adnlbjksiss2dkefqv8veajsv4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
voice.lenqueteur.net
voicenotes.msoffice-mailbox.top
199.192.20.103
46.29.161.207
1de493cf5af93d7f81defbff404efb2c04f4e7242dbf043b2d51a561a0a8231e
472642e023f7bbc385c990c398c26a2f9b78de91649dd1ffaefe2efab983481f
7af56af8dfa41d661de1e76d39a2576212eca6f40442c2c8865bafceffbea8cd
f664b8138c2da6ec7565500a7cc839da6372614a31dc04c5a2169a26b8d9767c