
Tags: c2 malware diamondfox
Submission: On January 14 via api from US
Summary
This is the only time microsoftenly.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 165.22.30.153 165.22.30.153 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 2a00:1450:400... 2a00:1450:4001:821::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:818::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
Domain Subdomains |
Transfer | |
---|---|---|
7 |
microsoftenly.com
|
425 KB |
1 |
gstatic.com
|
20 KB |
1 |
fonts.googleapis.com
|
614 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | microsoftenly.com |
microsoftenly.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
microsoftenly.com
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
Subject / Issuer | Validity | Valid |
---|---|---|
upload.video.google.com GTS CA 1O1 |
2020-12-15 - 2021-03-09 |
3 months |
*.gstatic.com GTS CA 1O1 |
2020-12-15 - 2021-03-09 |
3 months |
Screenshot

Detected technologies
Detected patterns
- headers server /php\/?([\d.]+)?/i

Detected patterns
- headers server /\bPerl\b(?: ?\/?v?([\d.]+))?/i
- headers server /mod_perl(?:\/([\d\.]+))?/i

Detected patterns
- headers server /Unix/i

Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
- headers server /mod_perl(?:\/([\d\.]+))?/i
Stats
0
Requests
0
%
HTTPS
0
%
IPv6
0
Domains
0
Subdomains
0
IPs
0
Countries
0
kB
Transfer
0
kB
Size
0
Cookies
0 Outgoing links
These are links going to different origins than the main page. For each link, only the first name is shown.
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
![]() /mts |
3 KB 3 KB |
Document text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css?family=Raleway
fonts.googleapis.com |
2 KB 614 B |
Stylesheet text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sbody.css
/mts/css |
77 B 414 B |
Stylesheet text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style-login.css
/mts/css |
1 KB 1 KB |
Stylesheet text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
title.png
/mts/img |
201 KB 201 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner8.png
/mts/img/banners |
206 KB 206 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
captcha.php?get=
/mts/inc |
7 KB 8 KB |
Image image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
/mts/css/images |
4 KB 4 KB |
Image image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1Ptxg8zYS_SKggPN4iEgvnHyvveLxVvaorCIPrcVIT9d0c8.woff
fonts.gstatic.com/s/raleway/v18 |
20 KB 20 KB |
Font font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Redirect requests
There were HTTP redirects (301, 302) for the following requests:
10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated number| currentTab function| showTab function| nextPrev function| validateForm function| fixStepIndicator1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
microsoftenly.com/ | Name: PHPSESSID Value: 7v90rksmegeur5guuda8urf4l3 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
microsoftenly.com
165.22.30.153
2a00:1450:4001:818::2003
2a00:1450:4001:821::200a
0b8c76a4a27a91897470588959b9c0ca0d10346b0acefd613155a365a071ca91
7ea462d36d729526ff5030bdddb6013c0767e4c1cb19c5c5e5bbec7e4b469a4c
9fa0e17a16b2ed9cd3c35b6e9fd703d93cc91df7c04629c9c649fb45ba31b5a5
cd597e0254fd2aadfcb3c0ece951207f2dfb738bb49257bf693403ce1619a7ec
ce54b04189785e70833abbf94a6b9190378afbab6de6ef04167db6f986b594b9
ceac10f7cda487ffabe9478b0e186e9287776b062d4f22e286d65d1759f66a71
dec61cbcd3c60cff412a7b07fb980cc9265339f9a55772b8ad9edf54aedea9f4
e51ddf20cc061214d453197b1d02cbe31bd0a271e2745c3da95a6b018e087ae3
eec797b0f161fed649a5fd629f60c08fdf7445a304929ea31939a7524b62c61a