URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://trk.klclick3.com/ls/click?upn=lyAa-2FU1-2BGKea1rCrDvl44ceCkvtHn-2B-2FKCgPAckpAFkKh8OEuWD5rL7ZcJJrMcwxmQLcKwFAoj6rnw1-2FX68AHU-2BTjOKCH0KdhEF1XWXE4mXOHyZ-2BeTsgmbYidzFtzlfDuaHbd0YfaISu8-2FWYhxzwGgBf7GPiRmGLVFAVYejHyPp7I4Hjo2IUX2gxISBLT2SInSAdBzYFnwk-2BHvp5-2Bl07fC-2FCnpMEK7QX7t34FNns6UcJBWcZ6DW4dHk9-2FprnKf-2FUDe3lFUvt0U-2FPt67tdz0hOhm3ijSwMY-2FUHwLjJ4dAEpqyIc-2Fd3RoW6hbXYWjN2NV0cPMxZ_IxYMOzdCViaB2QA-2FzkWa-2BVm7W7rxMgXE6093OHQL5YaQHppUFVO2zqHthWlOFu3erquT9d9-2BEd-2FqUxvnoQBh1DrD4y0W0ME34vAJ9eQfhPQnY4u6qBnthdoXJotvPpK59t5NsF-2F0fWU92kWaLDLqpBRm2Xc-2B8MFM9ERV38MAgr9EQCYbEyYFmPr-2Fc5WOXkvqGp9QbhAHVQcz66SoDx-2BWa2SsexHeDLFQiUfwBYX3dC9qgbbmPRLSrExFIBJpcUc3lpQNTAjBS3DssIyp0rQ-2BzWGQTWH6SxI862s0ULh-2FOk6cauXJOykCFLvWCyJCI5sFvltmLGMJgbrjpp1N-2F-2F9HT3-2BGlZ-2F-2FUnHJ9n9pF5GdNKrSkcAmCCyuBQQTszVgo7CauAeW-2BimELN1sdSibtq-2FuYw0DLDGRmlO7lNlQrAZ4-2FNWNu034UEhWusW8htPmaEJP#Y29tbXNAZ2xvYmFsLmNvbQ==
Resource
win10v2004-20230220-en
General
-
Target
https://trk.klclick3.com/ls/click?upn=lyAa-2FU1-2BGKea1rCrDvl44ceCkvtHn-2B-2FKCgPAckpAFkKh8OEuWD5rL7ZcJJrMcwxmQLcKwFAoj6rnw1-2FX68AHU-2BTjOKCH0KdhEF1XWXE4mXOHyZ-2BeTsgmbYidzFtzlfDuaHbd0YfaISu8-2FWYhxzwGgBf7GPiRmGLVFAVYejHyPp7I4Hjo2IUX2gxISBLT2SInSAdBzYFnwk-2BHvp5-2Bl07fC-2FCnpMEK7QX7t34FNns6UcJBWcZ6DW4dHk9-2FprnKf-2FUDe3lFUvt0U-2FPt67tdz0hOhm3ijSwMY-2FUHwLjJ4dAEpqyIc-2Fd3RoW6hbXYWjN2NV0cPMxZ_IxYMOzdCViaB2QA-2FzkWa-2BVm7W7rxMgXE6093OHQL5YaQHppUFVO2zqHthWlOFu3erquT9d9-2BEd-2FqUxvnoQBh1DrD4y0W0ME34vAJ9eQfhPQnY4u6qBnthdoXJotvPpK59t5NsF-2F0fWU92kWaLDLqpBRm2Xc-2B8MFM9ERV38MAgr9EQCYbEyYFmPr-2Fc5WOXkvqGp9QbhAHVQcz66SoDx-2BWa2SsexHeDLFQiUfwBYX3dC9qgbbmPRLSrExFIBJpcUc3lpQNTAjBS3DssIyp0rQ-2BzWGQTWH6SxI862s0ULh-2FOk6cauXJOykCFLvWCyJCI5sFvltmLGMJgbrjpp1N-2F-2F9HT3-2BGlZ-2F-2FUnHJ9n9pF5GdNKrSkcAmCCyuBQQTszVgo7CauAeW-2BimELN1sdSibtq-2FuYw0DLDGRmlO7lNlQrAZ4-2FNWNu034UEhWusW8htPmaEJP#Y29tbXNAZ2xvYmFsLmNvbQ==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]