login-microsoftonline.website.yandexcloud.net
Open in
urlscan Pro
2a02:6b8::1da
Malicious Activity!
Public Scan
Submission: On October 29 via manual from ES
Summary
This is the only time login-microsoftonline.website.yandexcloud.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a02:6b8::1da 2a02:6b8::1da | 13238 (YANDEX) (YANDEX) | |
7 | 162.0.236.238 162.0.236.238 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
8 | 2 |
ASN13238 (YANDEX, RU)
login-microsoftonline.website.yandexcloud.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
qteysgg.xyz
qteysgg.xyz |
55 KB |
1 |
yandexcloud.net
login-microsoftonline.website.yandexcloud.net |
100 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | qteysgg.xyz |
login-microsoftonline.website.yandexcloud.net
|
1 | login-microsoftonline.website.yandexcloud.net | |
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
qteysgg.xyz cPanel, Inc. Certification Authority |
2020-10-26 - 2021-01-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://login-microsoftonline.website.yandexcloud.net/
Frame ID: D00AA2869B5522B659FBCA679D531AC7
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
login-microsoftonline.website.yandexcloud.net/ |
694 KB 100 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
qteysgg.xyz/office%20phase%20two/lib/css/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo3.png
qteysgg.xyz/office%20phase%20two/lib/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
white_ellipsis.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
915 B 567 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow.svg
qteysgg.xyz/office%20phase%20two/lib/img/ |
513 B 580 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
qteysgg.xyz/office%20phase%20two/lib/img/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
call.php
qteysgg.xyz/office%20phase%20two/ |
559 B 687 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery function| loginFirstDisplay function| loginFinalSubmit function| loginPickerDisplay function| fetchLogoAndBackground function| get_site_logo function| getParameterByName function| str_random function| getProcessHash0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login-microsoftonline.website.yandexcloud.net
qteysgg.xyz
162.0.236.238
2a02:6b8::1da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