URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clickme.thryv.com/ls/click?upn=cn7RjEdg7G1tqznoeFWZtaKQ3bjg9aloTdCiNSsm5yrIhfthZt5oRu-2FcuSxeG2Wl80Xp_kEgmTnUoTsTtxoHyb-2Fz5ld8-2F7bpaihh-2FsJUuSZtvG5T7S7fUYPf2yyri9w8kWihKUu1ee-2BViYgY5Mtk-2BzDFraO-2BMjscoI9e5pJ1xdSvmkX202qCvFFsq0zIF-2B1tiXrzpnrlb49rOCWIigDe8iS1bt55rnEVv2jmepOjaeQz2CosVbInUxoB2jn9fAHeXQDR8ae8gSUuP9v9gnIgZ2WVnto109GvorKr9f156wuu-2Ff6bfG9N9LpnrSqIZcL-2BWNQnU5L-2FJWETAUNanAyLEyeMp0ukaMKqzat3lIEVoDBiPiUWSeddruvqeUVZ6MxGIchaEvL-2B9DeDnrvRG1jhgVDP-2Bxq2uhZSfNwK4psVwv6A4t1GJnA9JDTNmyGX-2BWXkIDr7nDohHIGBxMH7j2W-2FTo7874Prjbuo24JhXfT3YhqJ5LrQ-3D#YWxpY2UuYm90aXNAaW9uZ3JvdXAuY29t
Resource
win10v2004-20231215-en
General
-
Target
http://clickme.thryv.com/ls/click?upn=cn7RjEdg7G1tqznoeFWZtaKQ3bjg9aloTdCiNSsm5yrIhfthZt5oRu-2FcuSxeG2Wl80Xp_kEgmTnUoTsTtxoHyb-2Fz5ld8-2F7bpaihh-2FsJUuSZtvG5T7S7fUYPf2yyri9w8kWihKUu1ee-2BViYgY5Mtk-2BzDFraO-2BMjscoI9e5pJ1xdSvmkX202qCvFFsq0zIF-2B1tiXrzpnrlb49rOCWIigDe8iS1bt55rnEVv2jmepOjaeQz2CosVbInUxoB2jn9fAHeXQDR8ae8gSUuP9v9gnIgZ2WVnto109GvorKr9f156wuu-2Ff6bfG9N9LpnrSqIZcL-2BWNQnU5L-2FJWETAUNanAyLEyeMp0ukaMKqzat3lIEVoDBiPiUWSeddruvqeUVZ6MxGIchaEvL-2B9DeDnrvRG1jhgVDP-2Bxq2uhZSfNwK4psVwv6A4t1GJnA9JDTNmyGX-2BWXkIDr7nDohHIGBxMH7j2W-2FTo7874Prjbuo24JhXfT3YhqJ5LrQ-3D#YWxpY2UuYm90aXNAaW9uZ3JvdXAuY29t
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]