URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3BsYXlncm91bmRpZXAudXMvMmYzZi8_dXRtX3NvdXJjZT1tcy1uZXdzbGV0dGVyLTgyNTU1NS5iZWVoaWl2LmNvbSZ1dG1fbWVkaXVtPXJlZmVycmFsJnV0bV9jYW1wYWlnbj1uZXctcG9zdCIsInBvc3RfaWQiOiJiNTk5MTA2Mi04YWYzLTQyOGMtYmUxNy05N2YxMjc0MDcwYzIiLCJwdWJsaWNhdGlvbl9pZCI6IjdlODYwNmQ4LTViYzctNDc5ZC05Y2M5LTZmMGY1MjIwZTkxYyIsInZpc2l0X3Rva2VuIjoiNDIwYjQwMGMtYjQ3Ni00NjY4LTg5NGQtZDhjZmU1MTAzZTllIiwiaWF0IjoxNzA5NzQyNDgyLCJpc3MiOiJvcmNoaWQifQ.l8pmvLF51_PtvS3__mJRNdtuBwBZROQC8BFcg4qiR70#ZG9uaWNhLmJpZ2dlcnN0YWZmQGNvcnJvaGVhbHRoLmNvbQ==
Resource
win10v2004-20240226-en
General
-
Target
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL3BsYXlncm91bmRpZXAudXMvMmYzZi8_dXRtX3NvdXJjZT1tcy1uZXdzbGV0dGVyLTgyNTU1NS5iZWVoaWl2LmNvbSZ1dG1fbWVkaXVtPXJlZmVycmFsJnV0bV9jYW1wYWlnbj1uZXctcG9zdCIsInBvc3RfaWQiOiJiNTk5MTA2Mi04YWYzLTQyOGMtYmUxNy05N2YxMjc0MDcwYzIiLCJwdWJsaWNhdGlvbl9pZCI6IjdlODYwNmQ4LTViYzctNDc5ZC05Y2M5LTZmMGY1MjIwZTkxYyIsInZpc2l0X3Rva2VuIjoiNDIwYjQwMGMtYjQ3Ni00NjY4LTg5NGQtZDhjZmU1MTAzZTllIiwiaWF0IjoxNzA5NzQyNDgyLCJpc3MiOiJvcmNoaWQifQ.l8pmvLF51_PtvS3__mJRNdtuBwBZROQC8BFcg4qiR70#ZG9uaWNhLmJpZ2dlcnN0YWZmQGNvcnJvaGVhbHRoLmNvbQ==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]