URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clickme.thryv.com/ls/click?upn=cJhRv6f3Mqc3A-2Fj4wRuT0hYPKpnvZcyw4QvXk5mzRwIz68d5g-2BHuiev6cAV92f2NmEuZ_bxxXF2aCRmDeXrBAEXUgFS8SoZUhB5XWHU4B46NgJLz-2Bmc-2ByD5lxIKXAAeBF2rAdebWRQT9eOzSWH2bhYiy1vSlFSe5vfu8qhO-2FsFm56T0fIg3L-2FnIaW4qV57ZHd0P7zMU8UZmvIjo6bZXhl5VzDy-2FVIY6k-2BmbQqfqOUsPxSDEdcPV30NTmLbg0nBk83P8AsA66oIMFrx9sGpGyYtIISlFxZLBvXNhLzeSahvvMBT65mJMILHzL1M-2FUwW-2F49LNQEBqvRTGRY119-2FHBkXHuuygoGfLD2kdjpHtClAtkSa-2B-2FdOj88TCac1AOj70OMdmaXWAnhPgej3dcJwYJddgO7CHo73aJE-2BDDiNEhOhbB1esByDyBvg-2B05OyB6zsL9arSExpA0S-2BtXbQ4VRAYdGxWFNyw-3D-3D#[email protected]
Resource
win10v2004-20240226-en
General
-
Target
http://clickme.thryv.com/ls/click?upn=cJhRv6f3Mqc3A-2Fj4wRuT0hYPKpnvZcyw4QvXk5mzRwIz68d5g-2BHuiev6cAV92f2NmEuZ_bxxXF2aCRmDeXrBAEXUgFS8SoZUhB5XWHU4B46NgJLz-2Bmc-2ByD5lxIKXAAeBF2rAdebWRQT9eOzSWH2bhYiy1vSlFSe5vfu8qhO-2FsFm56T0fIg3L-2FnIaW4qV57ZHd0P7zMU8UZmvIjo6bZXhl5VzDy-2FVIY6k-2BmbQqfqOUsPxSDEdcPV30NTmLbg0nBk83P8AsA66oIMFrx9sGpGyYtIISlFxZLBvXNhLzeSahvvMBT65mJMILHzL1M-2FUwW-2F49LNQEBqvRTGRY119-2FHBkXHuuygoGfLD2kdjpHtClAtkSa-2B-2FdOj88TCac1AOj70OMdmaXWAnhPgej3dcJwYJddgO7CHo73aJE-2BDDiNEhOhbB1esByDyBvg-2B05OyB6zsL9arSExpA0S-2BtXbQ4VRAYdGxWFNyw-3D-3D#[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]