URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clickme.thryv.com/ls/click?upn=VyfUTP2bVlpK0hOwWs7CtOqqeL41hb89sINFTR-2FSfIb6JpPifBq3O8-2FbLe56kKbybKSJnNNT1froUtCuMvzziq1apfiBNBz-2B3DBWTlTl1Ik-3D8uho_CjhLEltjeUvNiSxzlEx-2Fo4f2AjxyuFZPJ6qZBQqs9WuRyc04d-2FspcOgvvEm6ByMAIg5elPgM-2BJ-2BAJm0MPon9uZumXhm3fTqi2esICVg0W6ADblRua5eu-2B5-2FJXO-2FKgtnTLoeqtS-2BMU65w44n-2FsZMmdzYKUjx8iL997YMNtL9bZyQaBenBepReF8fdVgcK6qN5NpsL22xJdRNfVYaiQxxxo6lGosGxumgv6bXR2iSJjzf2dBJvvVlSXbKrHG2iGPIfeMym596nVVv4hasE7EeD3pWjY8aw1XdcCTYznAkCenZJMWQm3IWPg5wxYAie3xCoT5QglOB4PRMvHLot0k17b-2BsAuqlMGVzxf5cKXqRwt5w-3D#amFja2llLm1vYWtAYXJjYWRpYS5pbw==
Resource
win10v2004-20240226-en
General
-
Target
http://clickme.thryv.com/ls/click?upn=VyfUTP2bVlpK0hOwWs7CtOqqeL41hb89sINFTR-2FSfIb6JpPifBq3O8-2FbLe56kKbybKSJnNNT1froUtCuMvzziq1apfiBNBz-2B3DBWTlTl1Ik-3D8uho_CjhLEltjeUvNiSxzlEx-2Fo4f2AjxyuFZPJ6qZBQqs9WuRyc04d-2FspcOgvvEm6ByMAIg5elPgM-2BJ-2BAJm0MPon9uZumXhm3fTqi2esICVg0W6ADblRua5eu-2B5-2FJXO-2FKgtnTLoeqtS-2BMU65w44n-2FsZMmdzYKUjx8iL997YMNtL9bZyQaBenBepReF8fdVgcK6qN5NpsL22xJdRNfVYaiQxxxo6lGosGxumgv6bXR2iSJjzf2dBJvvVlSXbKrHG2iGPIfeMym596nVVv4hasE7EeD3pWjY8aw1XdcCTYznAkCenZJMWQm3IWPg5wxYAie3xCoT5QglOB4PRMvHLot0k17b-2BsAuqlMGVzxf5cKXqRwt5w-3D#amFja2llLm1vYWtAYXJjYWRpYS5pbw==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]