URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://em.yotpo.com/ls/click?upn=asEVxM9D7AvZcaiq7A5uA6Dy1Hob5S4t6VBWd8Ter-2BNyUAjbht9ngUMNvUfaxTJP-2F-2FP4gxEq5Tm9Pdm9SbC-2BUA-3D-3DRnPr_LVcTQob8ek-2FwkmhbM9rsNXjWPIVnmISQUGdwlgvvzvyRjKmtmuo4Rymg2fxyXe-2BlzixfIuNyJMq1hcKex396qa2l6CZG5poSYW4BnfO2IgVJV-2Fu6ydGuqtAODFcNQaRZyjdjGX25UG4zl9K3kKzjQcBXdtNWGD1KAyupWCxhKBU-2BAXVTKfmWs2kzNzdqkmdioTjqZ9gj0Ah1xyXs2BwGL8oH-2BHcXeqdn8HFPPayupjIoBPF8CojNjEz3Tteo0T-2BvE-2FDlHD-2BIDFkBDWpJRSNGwIfOeVIhzy2XMilpvmRv3tJ8uPbtS-2FZfxN-2F8rxtLJjDzG8e0vk0y1-2FxUap33Im6tSnDSAD-2Bb34Pyp-2F1kafK88WUkSZxMFM3mnbMgnriQ29LlnpWdlPpQRMtVuWUFh9dmhq-2BJyse6KiLx1M1VYZoWjhNwz5usZ4Dd0Jph-2FWeyH2Hf1bMZDBH-2BJxxXfsmj6mhUoh7OVUAcvzUxduo7guXYZJbFO6c1gvDrffuTCoXaMW-2FpouDzj0oAqpRAJQZ-2Fp8ZdZki-2F9VmZbd-2BcGm9i8fGmrdS-2BqIPuwFe9LphEOFMs84E-2Frh38xxdiSjEFESh4vhiMGtpkD3C2Q53L8mi1dN-2FdCwwTQiKktypMRZg-2Fy-2F9MuKyd#c2VhbkBnYXJsb3NwaWVzLmNvbS5hdQ==
Resource
win11-20240221-en
General
-
Target
http://em.yotpo.com/ls/click?upn=asEVxM9D7AvZcaiq7A5uA6Dy1Hob5S4t6VBWd8Ter-2BNyUAjbht9ngUMNvUfaxTJP-2F-2FP4gxEq5Tm9Pdm9SbC-2BUA-3D-3DRnPr_LVcTQob8ek-2FwkmhbM9rsNXjWPIVnmISQUGdwlgvvzvyRjKmtmuo4Rymg2fxyXe-2BlzixfIuNyJMq1hcKex396qa2l6CZG5poSYW4BnfO2IgVJV-2Fu6ydGuqtAODFcNQaRZyjdjGX25UG4zl9K3kKzjQcBXdtNWGD1KAyupWCxhKBU-2BAXVTKfmWs2kzNzdqkmdioTjqZ9gj0Ah1xyXs2BwGL8oH-2BHcXeqdn8HFPPayupjIoBPF8CojNjEz3Tteo0T-2BvE-2FDlHD-2BIDFkBDWpJRSNGwIfOeVIhzy2XMilpvmRv3tJ8uPbtS-2FZfxN-2F8rxtLJjDzG8e0vk0y1-2FxUap33Im6tSnDSAD-2Bb34Pyp-2F1kafK88WUkSZxMFM3mnbMgnriQ29LlnpWdlPpQRMtVuWUFh9dmhq-2BJyse6KiLx1M1VYZoWjhNwz5usZ4Dd0Jph-2FWeyH2Hf1bMZDBH-2BJxxXfsmj6mhUoh7OVUAcvzUxduo7guXYZJbFO6c1gvDrffuTCoXaMW-2FpouDzj0oAqpRAJQZ-2Fp8ZdZki-2F9VmZbd-2BcGm9i8fGmrdS-2BqIPuwFe9LphEOFMs84E-2Frh38xxdiSjEFESh4vhiMGtpkD3C2Q53L8mi1dN-2FdCwwTQiKktypMRZg-2Fy-2F9MuKyd#c2VhbkBnYXJsb3NwaWVzLmNvbS5hdQ==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]