emta.internal.ee
Open in
urlscan Pro
46.226.143.54
Malicious Activity!
Public Scan
Submission: On September 29 via manual from EE — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 21st 2023. Valid for: 3 months.
This is the only time emta.internal.ee was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 11 | 46.226.143.54 46.226.143.54 | 56588 (EE-CERT E...) (EE-CERT EE CERT) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
internal.ee
3 redirects
emta.internal.ee |
44 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
11 | emta.internal.ee |
3 redirects
emta.internal.ee
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
emta.internal.ee R3 |
2023-08-21 - 2023-11-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://emta.internal.ee/79ami2iobawh5tpu
Frame ID: 2037FB7F7593F79D695FC332D7536CE4
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign in to your Microsoft accountDetected technologies
TrackJs (Analytics) ExpandDetected patterns
- tracker\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://emta.internal.ee/js/events.js HTTP 302
- https://emta.internal.ee/obfuscate?path=js/events.js
- https://emta.internal.ee/js/timeme.min.js HTTP 302
- https://emta.internal.ee/obfuscate?path=js/timeme.min.js
- https://emta.internal.ee/js/time-tracker.js HTTP 302
- https://emta.internal.ee/obfuscate?path=js/time-tracker.js
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
79ami2iobawh5tpu
emta.internal.ee/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
obfuscate
emta.internal.ee/ Redirect Chain
|
558 B 957 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
emta.internal.ee/public/campaign/102/138/11/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
emta.internal.ee/public/campaign/126/165/12/static/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.7.0.min.js.js
emta.internal.ee/public/campaign/175/246/12/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
obfuscate
emta.internal.ee/ Redirect Chain
|
4 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
obfuscate
emta.internal.ee/ Redirect Chain
|
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
track-time
emta.internal.ee/scenario/ |
0 562 B |
Ping
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| lucyDispatchEvent number| signmode function| clickSign function| $ function| jQuery object| TimeMe boolean| injected function| trackTime function| sendUserActivityTimeData function| runTimeTracker function| isChrome2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
emta.internal.ee/ | Name: PHPSESSID Value: 3hc6ufcs1kudqldfff02uvd3ok |
|
emta.internal.ee/ | Name: link Value: 79ami2iobawh5tpu |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
emta.internal.ee
46.226.143.54
1c1aff1501eb2b60d97d99b9f4cddfde783d6503a1a2f3fd7889d0ca9be45f26
1ebe19e41a80646d99691bf907f012f60c4a6f29d362ed8209a5e0964709808d
20bf8e95743ad0b8eaad3d92cbcd88bd7ce77633dcf6244817ed12365d4e06ce
30271beec01049a656ff39203516835b71c8119cab983e394ed1eb37bad26d01
646be94d8c530951d009c8553231592b098e8708da86fbf13019cde550148742
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f461879360934e6e3fa4ee59b15914b5fdc9723eb8e23ac93451eafbe97963b8
f53941103f6922446d2f5490b628638bffa13b74888ca07f40b2811ac743d98c