URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email-tracking.infobip.com/email/1/track/costco.com/[email protected]&webhookdata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url=https://8a45eb18.darksideoffice287473.workers.dev/?
Resource
win10v2004-20230915-en
General
-
Target
http://email-tracking.infobip.com/email/1/track/costco.com/[email protected]&webhookdata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url=https://8a45eb18.darksideoffice287473.workers.dev/?
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]