URL: https://mail.fsoft.com.vn/owa/auth/expiredpassword.aspx
Submission: On June 30 via manual from JP

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 103.227.219.13, located in Viet Nam and belongs to FPTSOFTWARE-AS-VN FPT Software Company limited, VN. The main domain is mail.fsoft.com.vn.
TLS certificate: Issued by RapidSSL RSA CA 2018 on July 12th 2019. Valid for: 2 years.
This is the only time mail.fsoft.com.vn was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Outlook Web Access (Online)

Domain & IP information

IP Address AS Autonomous System
1 103.227.219.13 131402 (FPTSOFTWA...)
1 2
Domain
Subdomains
Transfer
1 fsoft.com.vn
18 KB
1 1
Domain Requested by
1 mail.fsoft.com.vn
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
*.fsoft.com.vn
RapidSSL RSA CA 2018
2019-07-12 -
2021-10-10
2 years

Screenshot


Detected technologies

Web
Overall confidence: 50%
Detected patterns
  • url /\.aspx?(?:$|\?)/i

Web
Overall confidence: 100%
Detected patterns
  • url /\.aspx?(?:$|\?)/i

Web
Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Web
Overall confidence: 50%
Detected patterns
  • url /\.aspx?(?:$|\?)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set expiredpassword.aspx
/owa/auth
36 KB
18 KB
Document
General
Full URL
https://mail.fsoft.com.vn/owa/auth/expiredpassword.aspx
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
103.227.219.13 , Viet Nam, ASN131402 (FPTSOFTWARE-AS-VN FPT Software Company limited, VN),
Reverse DNS
Software
nginx / ASP.NET
Resource Hash
9d27e5451bf4809f377cbf4f2773b0ae84851c211412898f28a02a7654b5869b
Security Headers
Name Value
Public-Key-Pins max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains
Strict-Transport-Security max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains

Request headers

Host
mail.fsoft.com.vn
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx
Date
Tue, 30 Jun 2020 09:37:57 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Cache-Control
no-cache, no-store
Pragma
no-cache
Expires
-1
request-id
54d78905-b957-4149-86b0-c5056bb72718
Set-Cookie
ClientId=MBZYALRF0LZKAHLFXRUW; expires=Wed, 30-Jun-2021 09:37:57 GMT; path=/; HttpOnly
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Strict-Transport-Security
max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains
Public-Key-Pins
max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains
Content-Encoding
gzip
data:truncated
data:truncated
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d9ed6586942003696afe4e52b09f343f8342244b51a9e175b75162d7e615207b

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
data:truncated
data:truncated
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4de8fc175826d9f78fce9f9f2b71a63fe832fc7507e0394125c823b0909fa54a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
data:truncated
data:truncated
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6bd745cac7dd2e979f9e89dcd3c1ed3058812be0c88a06fc066360f74120b717

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
data:truncated
data:truncated
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6710ee6e22d5e3e82f70554804806c37aac5789b110d944383ea393d93eb627a

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
data:truncated
data:truncated
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
07f38b8b8c1f96ed85ecd96988f0454a95d1f665427086a507c72e55ff3ce0e7

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Outlook Web Access (Online)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| initExpPw function| chkAuth function| LogoffMime function| clkReLgn function| gbid number| g_fFcs string| a_sUrl number| a_fCAC string| mainDivClassName boolean| showPlaceholderText function| setPlaceholderText object| mainDiv

1 Cookies

Domain/Path Name / Value
mail.fsoft.com.vn/ Name: ClientId
Value: MBZYALRF0LZKAHLFXRUW

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Public-Key-Pins max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains max-age=3600; pin-sha256="Cm7n+dyRY9t97OOp3nIdI1sBq5U1BZfO+Y5WecBFgB0="; pin-sha256="k+4a7obu5IVsq0xaxDrzBSjPO0eNapo4x0xlahj3tlY="; includeSubDomains
Strict-Transport-Security max-age=31536000; includeSubDomains max-age=31536000; includeSubDomains