URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001O67rKGqv5C32YzRRQotspAL5R5jMg5_JSMDZeP18jaKsT_oifRhb3vy-ipvigVUnP0JT2Fi6ylPQdj9be4PN4YTZwoo2L6eJreQQSpTsfn9C8JW7TjsqtCKuq99hXspuXcc6i5xDxWVccqc_YOveJfyV8tVnd1h6ZyIj1O26z9PODzYmzZTpAw9hAGcGZrW0QbC9IfNnFkGqMaZM5FPPupFXDFpPBT66hnuDuVl7MT3CqNatKFc8mXNw_Zxe3hsq05X9lVNhBW4e81rnfCkrj6KBsRopt2H2eOQJHM6O6NA1xx9ZGOBqHfG-oacE9Qk8yu7RMnWw5LrObz_n9FrY7w==&c=H0-AXxVeG3P3j-MelTO5RJkB6deWhgJthYbrO9RLthtKsIwdJcjYrA==&ch=jLjOvC1ymuPiYh5D7UHorxSsv7cHMb1qIiEIphvV4J5_9MK4nu8bxQ==&__=c2hlbGxleS5tb3NzQGhzYy51dGFoLmVkdQ==
Resource
win10v2004-20230703-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001O67rKGqv5C32YzRRQotspAL5R5jMg5_JSMDZeP18jaKsT_oifRhb3vy-ipvigVUnP0JT2Fi6ylPQdj9be4PN4YTZwoo2L6eJreQQSpTsfn9C8JW7TjsqtCKuq99hXspuXcc6i5xDxWVccqc_YOveJfyV8tVnd1h6ZyIj1O26z9PODzYmzZTpAw9hAGcGZrW0QbC9IfNnFkGqMaZM5FPPupFXDFpPBT66hnuDuVl7MT3CqNatKFc8mXNw_Zxe3hsq05X9lVNhBW4e81rnfCkrj6KBsRopt2H2eOQJHM6O6NA1xx9ZGOBqHfG-oacE9Qk8yu7RMnWw5LrObz_n9FrY7w==&c=H0-AXxVeG3P3j-MelTO5RJkB6deWhgJthYbrO9RLthtKsIwdJcjYrA==&ch=jLjOvC1ymuPiYh5D7UHorxSsv7cHMb1qIiEIphvV4J5_9MK4nu8bxQ==&__=c2hlbGxleS5tb3NzQGhzYy51dGFoLmVkdQ==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]