URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://charmed-flashy-elm.glitch.me/?doc=aHR0cHM6Ly9hcnJvdy1taW50LXJh&[email protected]&docpath=bWJ1dGFuLmdsaXRjaC5tZS8=&pdfnamedoc1=Non-Disclosure%20Agreement_740426&pdfnamedoc2=Contract_944426&pdfnamedoc3=Payment%20Receipt_8971501&date=12%20Jun%202023&token=
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
https://charmed-flashy-elm.glitch.me/?doc=aHR0cHM6Ly9hcnJvdy1taW50LXJh&[email protected]&docpath=bWJ1dGFuLmdsaXRjaC5tZS8=&pdfnamedoc1=Non-Disclosure%20Agreement_740426&pdfnamedoc2=Contract_944426&pdfnamedoc3=Payment%20Receipt_8971501&date=12%20Jun%202023&token=
Resource
win10v2004-20230220-en
General
-
Target
https://charmed-flashy-elm.glitch.me/?doc=aHR0cHM6Ly9hcnJvdy1taW50LXJh&[email protected]&docpath=bWJ1dGFuLmdsaXRjaC5tZS8=&pdfnamedoc1=Non-Disclosure%20Agreement_740426&pdfnamedoc2=Contract_944426&pdfnamedoc3=Payment%20Receipt_8971501&date=12%20Jun%202023&token=
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]