URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3d3dy5uamxzaW5jLmNsaWNrLzBhczNhc28vP3V0bV9zb3VyY2U9b2VhMDNhaDMwOWFuZC5iZWVoaWl2LmNvbSZ1dG1fbWVkaXVtPXJlZmVycmFsJnV0bV9jYW1wYWlnbj1uZXctcG9zdCIsInBvc3RfaWQiOiIwYjI0N2NmZi04MzE5LTQ1NDMtYmRmYS1iYjhkNWVhNjlmZWMiLCJwdWJsaWNhdGlvbl9pZCI6ImUyMzc0NTc4LTM0NDAtNDJmNi05NzkwLTkxODMxYTk5YjUwMiIsInZpc2l0X3Rva2VuIjoiNTE3MzZmMjUtY2UyNS00YmU5LTk2YTUtY2M5NmJlNTExMTAzIiwiaWF0IjoxNzA4MzkwNDkzLCJpc3MiOiJvcmNoaWQifQ.dg6MWIx33hyBQeQH8pca8k1UYDqVtUrwgbB7VoE5AV4#ZmFpc2VsLmtoYW5Ac2VtcHJhbG5nLmNvbQ==
Resource
win10v2004-20231215-en
General
-
Target
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3d3dy5uamxzaW5jLmNsaWNrLzBhczNhc28vP3V0bV9zb3VyY2U9b2VhMDNhaDMwOWFuZC5iZWVoaWl2LmNvbSZ1dG1fbWVkaXVtPXJlZmVycmFsJnV0bV9jYW1wYWlnbj1uZXctcG9zdCIsInBvc3RfaWQiOiIwYjI0N2NmZi04MzE5LTQ1NDMtYmRmYS1iYjhkNWVhNjlmZWMiLCJwdWJsaWNhdGlvbl9pZCI6ImUyMzc0NTc4LTM0NDAtNDJmNi05NzkwLTkxODMxYTk5YjUwMiIsInZpc2l0X3Rva2VuIjoiNTE3MzZmMjUtY2UyNS00YmU5LTk2YTUtY2M5NmJlNTExMTAzIiwiaWF0IjoxNzA4MzkwNDkzLCJpc3MiOiJvcmNoaWQifQ.dg6MWIx33hyBQeQH8pca8k1UYDqVtUrwgbB7VoE5AV4#ZmFpc2VsLmtoYW5Ac2VtcHJhbG5nLmNvbQ==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]