licogi18.com.vn
Open in
urlscan Pro
103.35.65.214
Malicious Activity!
Public Scan
Effective URL: http://licogi18.com.vn/login.microsoftonline.com/login.php?tes.php?https://login.live.com/GetSessionState.srf?response_...
Submission: On January 29 via api from US
Summary
This is the only time licogi18.com.vn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Office 365 (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 119.110.108.102 119.110.108.102 | 17971 (TMVADS-AP...) (TMVADS-AP TM-VADS DC Hosting) | |
1 8 | 103.35.65.214 103.35.65.214 | 18403 (FPT-AS-AP...) (FPT-AS-AP The Corporation for Financing & Promoting Technology) | |
8 | 2 |
ASN17971 (TMVADS-AP TM-VADS DC Hosting, MY)
PTR: piper.localdns.com
junglecraft.com.my |
ASN18403 (FPT-AS-AP The Corporation for Financing & Promoting Technology, VN)
licogi18.com.vn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
licogi18.com.vn
1 redirects
licogi18.com.vn |
19 KB |
1 |
junglecraft.com.my
junglecraft.com.my |
554 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | licogi18.com.vn |
1 redirects
licogi18.com.vn
|
1 | junglecraft.com.my | |
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://licogi18.com.vn/login.microsoftonline.com/login.php?tes.php?https://login.live.com/GetSessionState.srf?response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&scope=openid+profile+email+offline_access&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2&state=rQIIAeNisNLLKCkpKLbS109Myc3M0ysoyi9JTS7JzM_Tyy8tycnPz9ZLzs_Vyy9Kz0wBsYqEuAQUN61SL7LY4N-7wPjWqz9ev2YxcsbnZJalguRXMWoSY6B-anKB_gVGxheMjJuY2H2dPOO9XSNPMDUfk7vFJOhflO6ZEl7slpqSWpQI0nmBReAVC48BsxUHB5sAowSDAsMPFsZFrECnTAo1qLmuZuK0OaTi9yltYYZTrPoF2flJ3mF5xZ5ubgbZfvmu5mmRptmpzmEmxvplAZYF5VU-FaFhZb4B2VXJtkZWhhPYhCawMZ1iY9jFSbzLAQ2&estsfed=1&uaid=27aab22138724fb08da033daeafc4afa&vaccess&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2&state=rQIIAeNisNLLKCkpKLbS109Myc3M0ysoyi9JTS7JzM_Tyy8tycnPz9ZLzs_Vyy9Kz0wBsYqEuAQUN61SL7LY4N-7wPjWqz9ev2YxcsbnZJalguRXMWoSY6B-anKB_gVGxheMjJuY2H2dPOO9XSNPMDUfk7vFJOhflO6ZEl7slpqSWpQI0nmBReAVC48BsxUHB5sAowSDAsMPFsZFrECnTAo1qLmuZuK0OaTi9yltYYZTrPoF2flJ3mF5xZ5ubgbZfvmu5mmRptmpzmEmxvplAZYF5VU-FaFhZb4B2VXJtkZWhhPYhCawMZ1iY9jFSbzLAQ2&estsfed=1&uaid=27aab22138724fb08da033daeafc4afa&vv=1600&mkt=EN-US&lc=1033&emailcmd=login_submit&id=14491b756b3a51daac41c2486328554914491b756b3a51daac41c24863285549&session=14491b756b3a51daac41c2486328554914491b756b3a51daac41c24863285549
Frame ID: B7C8D50043D08F66ABFDCEFEE95C0D32
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://junglecraft.com.my/office.html Page URL
-
http://licogi18.com.vn/login.microsoftonline.com/
HTTP 302
http://licogi18.com.vn/login.microsoftonline.com/login.php?tes.php?https://login.live.com/GetSessio... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://junglecraft.com.my/office.html Page URL
-
http://licogi18.com.vn/login.microsoftonline.com/
HTTP 302
http://licogi18.com.vn/login.microsoftonline.com/login.php?tes.php?https://login.live.com/GetSessionState.srf?response_type=code&client_id=51483342-085c-4d86-bf88-cf50c7252078&scope=openid+profile+email+offline_access&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2&state=rQIIAeNisNLLKCkpKLbS109Myc3M0ysoyi9JTS7JzM_Tyy8tycnPz9ZLzs_Vyy9Kz0wBsYqEuAQUN61SL7LY4N-7wPjWqz9ev2YxcsbnZJalguRXMWoSY6B-anKB_gVGxheMjJuY2H2dPOO9XSNPMDUfk7vFJOhflO6ZEl7slpqSWpQI0nmBReAVC48BsxUHB5sAowSDAsMPFsZFrECnTAo1qLmuZuK0OaTi9yltYYZTrPoF2flJ3mF5xZ5ubgbZfvmu5mmRptmpzmEmxvplAZYF5VU-FaFhZb4B2VXJtkZWhhPYhCawMZ1iY9jFSbzLAQ2&estsfed=1&uaid=27aab22138724fb08da033daeafc4afa&vaccess&response_mode=form_post&redirect_uri=https%3a%2f%2flogin.microsoftonline.com%2fcommon%2ffederation%2foauth2&state=rQIIAeNisNLLKCkpKLbS109Myc3M0ysoyi9JTS7JzM_Tyy8tycnPz9ZLzs_Vyy9Kz0wBsYqEuAQUN61SL7LY4N-7wPjWqz9ev2YxcsbnZJalguRXMWoSY6B-anKB_gVGxheMjJuY2H2dPOO9XSNPMDUfk7vFJOhflO6ZEl7slpqSWpQI0nmBReAVC48BsxUHB5sAowSDAsMPFsZFrECnTAo1qLmuZuK0OaTi9yltYYZTrPoF2flJ3mF5xZ5ubgbZfvmu5mmRptmpzmEmxvplAZYF5VU-FaFhZb4B2VXJtkZWhhPYhCawMZ1iY9jFSbzLAQ2&estsfed=1&uaid=27aab22138724fb08da033daeafc4afa&vv=1600&mkt=EN-US&lc=1033&emailcmd=login_submit&id=14491b756b3a51daac41c2486328554914491b756b3a51daac41c24863285549&session=14491b756b3a51daac41c2486328554914491b756b3a51daac41c24863285549 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
office.html
junglecraft.com.my/ |
563 B 554 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
licogi18.com.vn/login.microsoftonline.com/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f1.png
licogi18.com.vn/login.microsoftonline.com/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f4.png
licogi18.com.vn/login.microsoftonline.com/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f2.png
licogi18.com.vn/login.microsoftonline.com/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f3.png
licogi18.com.vn/login.microsoftonline.com/images/ |
863 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f5.png
licogi18.com.vn/login.microsoftonline.com/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buton1.png
licogi18.com.vn/login.microsoftonline.com/images/ |
603 B 849 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Office 365 (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
junglecraft.com.my
licogi18.com.vn
103.35.65.214
119.110.108.102
0fd0bf8ee301b4a8f20737ec77ad8bfd43d580842f83be81c7393a07a1e902bc
21926c150429acb33efdd2e8347cf5675a4dce9369d257307015695d6684e506
73c81cebfcb1f42dd320fd96e16e322573cf9295d3d434e816801f3d19da5951
814d279211f63c425bce9a7ea327f61fd0605700c0b66427cc2902124e262e9e
8245b6fae9bbdf3a13f3b5963359d200e1cd10b90694631d556fca07978610f2
9e9e4e516e46a0ad7364c691c823513e256144217281f39c47f9f8644ad8e882
caa1d7d3c14ae4c08df39cbeddd74b35043a8c17b42004a965db51a8e9461183
fa0a3c38510e56d83b965e3dc6bbf79eabab8780571c768388ef7f6f8af258be