URL: http://mail.3gtel.net/finance/images/login.php
Submission: On June 13 via automatic, source openphish

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 8 HTTP transactions. The main IP is 193.34.145.202, located in Germany and belongs to CONTABO, DE. The main domain is mail.3gtel.net.
This is the only time mail.3gtel.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 193.34.145.202 51167 (CONTABO)
6 104.109.59.57 20940 (AKAMAI-ASN1)
1 40.101.83.194 8075 (MICROSOFT...)
8 3
Domain Requested by
4 auth.gfx.ms mail.3gtel.net
2 msagfx.live.com mail.3gtel.net
1 outlook.office365.com mail.3gtel.net
1 mail.3gtel.net
8 4

This site contains links to these domains. Also see Links.

Domain
signup.live.com
login.live.com
Subject Issuer Validity Valid
outlook.com
DigiCert Cloud Services CA-1
2017-09-13 -
2018-09-13
a year crt.sh

This page contains 2 frames:

Primary Page: http://mail.3gtel.net/finance/images/login.php
Frame ID: 6B0D0B116E8130562891E003776C8C54
Requests: 7 HTTP requests in this frame

Frame: https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Frame ID: B1A5AEC634246A9F4C7BCC5DDDB43A22
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • env /^webpackJsonp$/i

Page Statistics

8
Requests

13 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

409 kB
Transfer

669 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
mail.3gtel.net/finance/images/
17 KB
17 KB
Document
General
Full URL
http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
193.34.145.202 , Germany, ASN51167 (CONTABO, DE),
Reverse DNS
m3499.contabo.net
Software
Apache / PHP/5.6.36
Resource Hash
b4c9158947f3ca3a8a3048b114ea75b5065adfab563983820ba9b8946e3e7c71

Request headers

Host
mail.3gtel.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
6B0D0B116E8130562891E003776C8C54

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Server
Apache
X-Powered-By
PHP/5.6.36
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Keep-Alive
timeout=5, max=100
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Converged1033.css
auth.gfx.ms/16.000.27486.00/
85 KB
17 KB
Stylesheet
General
Full URL
https://auth.gfx.ms/16.000.27486.00/Converged1033.css
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
0df34b37d2d23a2a5056ac368248444c36789c9f71b7e15c13e056b722f335ff

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 20 Jul 2017 03:25:15 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"809f9ecd71d31:0"
Vary
Accept-Encoding
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=118124
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
16598
Server
Microsoft-IIS/8.5
microsoft_logo.svg
auth.gfx.ms/16.000.27486.00/images/
4 KB
2 KB
Image
General
Full URL
https://auth.gfx.ms/16.000.27486.00/images/microsoft_logo.svg?x=ee5c8d9fb6248c938fd0dc19370e90bd
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 20 Jul 2017 03:25:15 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"809f9ecd71d31:0"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Cache-Control
max-age=118161
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1435
Server
Microsoft-IIS/8.5
ConvergedLoginPaginatedStrings.EN.js
msagfx.live.com/16.000.27486.00/
13 KB
5 KB
Script
General
Full URL
https://msagfx.live.com/16.000.27486.00/ConvergedLoginPaginatedStrings.EN.js
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
d8ab78297233d51f0bb42896782c4a8acdd6aaeec0d6372bab1f73d4d85f6538

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 20 Jul 2017 03:25:16 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"03637ce71d31:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=118116
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4328
Server
Microsoft-IIS/8.5
ConvergedLogin_PCore.js
msagfx.live.com/16.000.27486.00/
258 KB
76 KB
Script
General
Full URL
https://msagfx.live.com/16.000.27486.00/ConvergedLogin_PCore.js
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
6ccd4a3b849014b27e2fba0eef0638a6f163fb5916732e60813c5451025f54f8

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 20 Jul 2017 03:25:16 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"03637ce71d31:0"
Vary
Accept-Encoding
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=118162
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
77698
Server
Microsoft-IIS/8.5
Cookie set prefetch.aspx
outlook.office365.com/owa/ Frame B1A5
0
0
Document
General
Full URL
https://outlook.office365.com/owa/prefetch.aspx?id=292841&mkt=EN-US
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
40.101.83.194 , United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Host
outlook.office365.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://mail.3gtel.net/finance/images/login.php
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
6B0D0B116E8130562891E003776C8C54
Referer
http://mail.3gtel.net/finance/images/login.php

Response headers

Cache-Control
private, no-store
Content-Type
text/html
Server
Microsoft-IIS/10.0
request-id
9ecd1083-8732-4c28-972d-d4d9d7455b61
X-CalculatedFETarget
HE1P189CU001.internal.outlook.com
X-BackEndHttpStatus
200 200
Set-Cookie
ClientId=5F8A71804BF74023B157A7D6F4D3E4E9; expires=Thu, 13-Jun-2019 06:52:40 GMT; path=/; secure ClientId=5F8A71804BF74023B157A7D6F4D3E4E9; expires=Thu, 13-Jun-2019 06:52:40 GMT; path=/; secure OIDC=1; expires=Thu, 13-Dec-2018 06:52:40 GMT; path=/; secure; HttpOnly
X-FEProxyInfo
HE1P189CA0012.EURP189.PROD.OUTLOOK.COM
X-CalculatedBETarget
HE1PR01MB1308.eurprd01.prod.exchangelabs.com
X-RUM-Validated
1
X-Content-Type-Options
nosniff
X-OWA-Version
15.20.841.19
X-OWA-DiagnosticsInfo
2;0;0
X-BackEnd-Begin
2018-06-13T06:52:40.509
X-BackEnd-End
2018-06-13T06:52:40.512
X-DiagInfo
HE1PR01MB1308
X-BEServer
HE1PR01MB1308
X-UA-Compatible
IE=EmulateIE7
Strict-Transport-Security
max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains
X-FEServer
HE1P189CA0012 AM0PR01CA0008
X-Powered-By
ASP.NET
Date
Wed, 13 Jun 2018 06:52:39 GMT
Content-Length
0
0.jpg
auth.gfx.ms/16.000.27486.00/images/Backgrounds/
291 KB
291 KB
Image
General
Full URL
https://auth.gfx.ms/16.000.27486.00/images/Backgrounds/0.jpg?x=f5a9a9531b8f4bcc86eabb19472d15d5
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
62faab60433070e2ea52c235f0f18db228759f2a08bb6f9e5711630df8321214

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Last-Modified
Thu, 20 Jul 2017 03:25:15 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"809f9ecd71d31:0"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
max-age=118027
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
298105
Server
Microsoft-IIS/8.5
0-small.jpg
auth.gfx.ms/16.000.27486.00/images/Backgrounds/
1 KB
1 KB
Image
General
Full URL
https://auth.gfx.ms/16.000.27486.00/images/Backgrounds/0-small.jpg?x=12f4b8b543125cc986c79cd85320812f
Requested by
Host: mail.3gtel.net
URL: http://mail.3gtel.net/finance/images/login.php
Protocol
HTTP/1.1
Server
104.109.59.57 Amsterdam, Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-59-57.deploy.static.akamaitechnologies.com
Software
Microsoft-IIS/8.5 /
Resource Hash
c13db279143e1845ee4aaee5afedc5bd75e9f7d50024b63883b45332c4960b3b

Request headers

Referer
http://mail.3gtel.net/finance/images/login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Wed, 13 Jun 2018 06:52:40 GMT
Last-Modified
Thu, 20 Jul 2017 03:25:15 GMT
PPServer
PPV: 30 H: BAYIDSPRTS3G003 V: 0
ETag
"809f9ecd71d31:0"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
max-age=118161
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1029
Server
Microsoft-IIS/8.5

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| PROOF number| g_iSRSFailed string| g_sSRSSuccess function| SRSRetry object| g_dtFirstByte object| g_objPageMode object| StringRepository boolean| __ConvergedLoginPaginatedStrings function| webpackJsonp

2 Cookies

Domain/Path Name / Value
outlook.office365.com/ Name: OIDC
Value: 1
outlook.office365.com/ Name: ClientId
Value: 5F8A71804BF74023B157A7D6F4D3E4E9