leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com
Open in
urlscan Pro
206.190.215.254
Malicious Activity!
Public Scan
Submission: On December 03 via manual from AU — Scanned from US
Summary
TLS certificate: Issued by R3 on November 30th 2021. Valid for: 3 months.
This is the only time leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 206.190.215.254 206.190.215.254 | 32354 (UNWIRED) (UNWIRED) | |
5 | 2620:1ec:46::70 2620:1ec:46::70 | 8068 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:80c::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 4 |
ASN32354 (UNWIRED, US)
PTR: s3.us-west-002.backblazeb2.com
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
msauth.net
logincdn.msauth.net |
23 KB |
1 |
googleapis.com
ajax.googleapis.com |
31 KB |
1 |
backblazeb2.com
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com |
86 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
5 | logincdn.msauth.net |
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com
|
1 | ajax.googleapis.com |
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com
|
1 | leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com | |
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
backblazeb2.com R3 |
2021-11-30 - 2022-02-28 |
3 months | crt.sh |
identitycdn.msauth.net Microsoft Azure TLS Issuing CA 06 |
2021-11-22 - 2022-11-17 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2021-11-01 - 2022-01-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com/login2.html?username=victim.example.com
Frame ID: 5A650C30B55143A392BB64105A96A579
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login2.html
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com/ |
85 KB 86 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Converged_v21033_5plpI1P0_uKjrokWdqCoBw2.css
logincdn.msauth.net/16.000/ |
103 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_635a63d500a92a0b8497cdc58d0f66b1.svg
logincdn.msauth.net/shared/1.0/content/images/ |
900 B 556 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ellipsis_grey_2b5d393db04a5e6e1f739cb266e65b4c.svg
logincdn.msauth.net/shared/1.0/content/images/ |
915 B 543 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2_bc3d32a696895f78c19df6c717586a5d.svg
logincdn.msauth.net/shared/1.0/content/images/backgrounds/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| _0x31aa function| _0x3118 object| Zlib function| $ function| jQuery function| getBaseUrl function| mg function| randomInteger function| randomString function| getdomainpartofemail function| get_email_hash function| validateEmail function| geturlparameter function| get_rand_url_pars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
leas-mycogastritis-ryas.s3.us-west-002.backblazeb2.com
logincdn.msauth.net
206.190.215.254
2607:f8b0:4006:80c::200a
2620:1ec:46::70
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68
16c3f6531d0fa5b4d16e82abf066233b2a9f284c068c663699313c09f5e8d6e6
61d7ccc5d2c41bf86be6cefb0063405067849ba64e9f219f60596ef09a54a942
8b20b42e14e3d490035603ebdcaa4abc9133ba203a12901aacf8aba7f550803d
a1628cef037d3930abed04e0db3eaa1fe2eeedfd60e843da356ada1ff9d0d432
edc22ddb46d0dee7c192892cb834e4c9bfea54bf5fd324d01357d5249db8d6d4
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d