URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3Nob3dlcmdsYXNzaGF3YWlpLmNvbS9hZG1pbi8yZjNmP3V0bV9zb3VyY2U9dmFtcHMtbmV3c2xldHRlci04YmU0MjUuYmVlaGlpdi5jb20mdXRtX21lZGl1bT1yZWZlcnJhbCZ1dG1fY2FtcGFpZ249bmV3LXBvc3QiLCJwb3N0X2lkIjoiMWIzZWIxMTktZmNkMC00MDc1LWE2MzEtMzgyYTdkMDQyOTZmIiwicHVibGljYXRpb25faWQiOiJiZWI1NGU2NS00Y2I0LTQ5MzEtYjM0MS1lMzBjYzdjMGFmNGEiLCJ2aXNpdF90b2tlbiI6IjI5YTNiZjA2LWI4MTEtNDYyZS05MzY3LTFkOTdkMWVlZjY3OSIsImlhdCI6MTcwOTY3ODczMiwiaXNzIjoib3JjaGlkIn0.a_L9bhgdTFm9-XWX_bX6EmQI59sZ5ochihB_MjTAbrA#YW5kZXJzLmEuZXJpa3Nzb25Adm9sdm8uY29t
Resource
win10v2004-20240226-en
General
-
Target
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3Nob3dlcmdsYXNzaGF3YWlpLmNvbS9hZG1pbi8yZjNmP3V0bV9zb3VyY2U9dmFtcHMtbmV3c2xldHRlci04YmU0MjUuYmVlaGlpdi5jb20mdXRtX21lZGl1bT1yZWZlcnJhbCZ1dG1fY2FtcGFpZ249bmV3LXBvc3QiLCJwb3N0X2lkIjoiMWIzZWIxMTktZmNkMC00MDc1LWE2MzEtMzgyYTdkMDQyOTZmIiwicHVibGljYXRpb25faWQiOiJiZWI1NGU2NS00Y2I0LTQ5MzEtYjM0MS1lMzBjYzdjMGFmNGEiLCJ2aXNpdF90b2tlbiI6IjI5YTNiZjA2LWI4MTEtNDYyZS05MzY3LTFkOTdkMWVlZjY3OSIsImlhdCI6MTcwOTY3ODczMiwiaXNzIjoib3JjaGlkIn0.a_L9bhgdTFm9-XWX_bX6EmQI59sZ5ochihB_MjTAbrA#YW5kZXJzLmEuZXJpa3Nzb25Adm9sdm8uY29t
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]