Static task
static1
URLScan task
urlscan1
Sample
https://j131t35i71.execute-api.us-west-2.amazonaws.com/track?curr_track_type=open_track&temp_id=IjIzNjUxNSI_3D&email_id=richard.fernez%40wyndham.com&s_id=updvov&server=ses&type=replace_drip_type
Behavioral task
behavioral1
Sample
https://j131t35i71.execute-api.us-west-2.amazonaws.com/track?curr_track_type=open_track&temp_id=IjIzNjUxNSI_3D&email_id=richard.fernez%40wyndham.com&s_id=updvov&server=ses&type=replace_drip_type
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
https://j131t35i71.execute-api.us-west-2.amazonaws.com/track?curr_track_type=open_track&temp_id=IjIzNjUxNSI_3D&email_id=richard.fernez%40wyndham.com&s_id=updvov&server=ses&type=replace_drip_type
Score
8/10
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: richard.fernez@wyndham.com