URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clickme.thryv.com/ls/click?upn=u001.dWMqEYBIuxWGqsZsQRCRgSBzbA1CFmYZWovuzi-2FiXjBCIf-2BSCF941LTDPRtpV8KXTkSz_VGTOh0XByfTefzXwOhsX-2Bm5xAWZwpGkO7vRpqRBAUGTjZWNIFAHx6Tm3FX2pKd-2BUk2XH3vOH3tg5MZAvGQE-2BL4hNE7qP6T5tr8BYPiaesYWh6LLtDlU0v7lHzq-2BsVZdZMG0QrvWjzjRktOH3VRgkhOTAhHxp5JXjsPjOUmG2941n2taZ6-2BnC-2F-2F8PkJxL9zkbDEQxHfo8VM-2BK1wXgWn3NQoNJTRhAzNoMvrV1E-2FN9ZnJtM27SgSC3xFKwkw2Ah1-2BmT-2B6buofyIKsVq0ovSRJ6YSrRbibL-2Fzy9DUc5T7gkfAMAKIbUU4BP5-2FCUyDuXAaiM0ya5-2FwWz2OmndwRSk27uZYCGLBIRXIVfXdj6n43ckDQ-3D#bWlrZS5nYWxsYWdoZXJAb3BlbmxpbmsuY29t
Resource
win11-20240221-en
General
-
Target
http://clickme.thryv.com/ls/click?upn=u001.dWMqEYBIuxWGqsZsQRCRgSBzbA1CFmYZWovuzi-2FiXjBCIf-2BSCF941LTDPRtpV8KXTkSz_VGTOh0XByfTefzXwOhsX-2Bm5xAWZwpGkO7vRpqRBAUGTjZWNIFAHx6Tm3FX2pKd-2BUk2XH3vOH3tg5MZAvGQE-2BL4hNE7qP6T5tr8BYPiaesYWh6LLtDlU0v7lHzq-2BsVZdZMG0QrvWjzjRktOH3VRgkhOTAhHxp5JXjsPjOUmG2941n2taZ6-2BnC-2F-2F8PkJxL9zkbDEQxHfo8VM-2BK1wXgWn3NQoNJTRhAzNoMvrV1E-2FN9ZnJtM27SgSC3xFKwkw2Ah1-2BmT-2B6buofyIKsVq0ovSRJ6YSrRbibL-2Fzy9DUc5T7gkfAMAKIbUU4BP5-2FCUyDuXAaiM0ya5-2FwWz2OmndwRSk27uZYCGLBIRXIVfXdj6n43ckDQ-3D#bWlrZS5nYWxsYWdoZXJAb3BlbmxpbmsuY29t
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]