URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://15db7178-6f648406.vonherteninterprises.com/adfs/ls/?login_hint=ahmed.lari%40ymc.ae&client-request-id=8a129c05-2352-49b5-8c4e-ec45a23e5a12&username=ahmed.lari%40ymc.ae&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuARY5wh1BSlv9ezxe-O6yC5KaBWjMmEj9C8wMr5gZJzEJJiYkZuaopeTWJTpUJmbrJeYeotJ0L8o3TMlvNgtNSW1KLEkMz_vETOmugssAq9YeAyYrTg4uAQYJBgUGH6wMC5iBboobcEDX_ljHr7rda9sFbdnYDjFqh-R7pKbXVpU6B9l4BUeYJLrVKWdF-Br4W9k5lqY71XhaGhsalFe5hLmWlFua2plOIFNaAIb0yk2hg9sjB3sDLPYGQ5wMh7gZfjBN3P--fsHV1176_GKX8cxMNCjwLXIKyc4NCu7MK3cqMjd3TLSKyMyotjJNC_QMstCP60sxD0kOdfRFgA1#
Resource
win10v2004-20230220-en
General
-
Target
https://15db7178-6f648406.vonherteninterprises.com/adfs/ls/?login_hint=ahmed.lari%40ymc.ae&client-request-id=8a129c05-2352-49b5-8c4e-ec45a23e5a12&username=ahmed.lari%40ymc.ae&wa=wsignin1.0&wtrealm=urn%3afederation%3aMicrosoftOnline&wctx=estsredirect%3d2%26estsrequest%3drQQIARAA42Kw0skoKSkottLXL8gvKknM0cvNTC7KL85PK8nPy8nMS9VLzs_Vyy9Kz0wBsYqEuARY5wh1BSlv9ezxe-O6yC5KaBWjMmEj9C8wMr5gZJzEJJiYkZuaopeTWJTpUJmbrJeYeotJ0L8o3TMlvNgtNSW1KLEkMz_vETOmugssAq9YeAyYrTg4uAQYJBgUGH6wMC5iBboobcEDX_ljHr7rda9sFbdnYDjFqh-R7pKbXVpU6B9l4BUeYJLrVKWdF-Br4W9k5lqY71XhaGhsalFe5hLmWlFua2plOIFNaAIb0yk2hg9sjB3sDLPYGQ5wMh7gZfjBN3P--fsHV1176_GKX8cxMNCjwLXIKyc4NCu7MK3cqMjd3TLSKyMyotjJNC_QMstCP60sxD0kOdfRFgA1#
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]