URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL2UtdG9sbC5jby56YS9hdXRvbXMtZW1haWxzP3V0bV9zb3VyY2U9am9uYWhzLW5ld3NsZXR0ZXItMTUwNGE1LmJlZWhpaXYuY29tJnV0bV9tZWRpdW09cmVmZXJyYWwmdXRtX2NhbXBhaWduPW5ldy1wb3N0IiwicG9zdF9pZCI6ImZjNjI2MDkwLTY3MTEtNDYzZS1iNDBiLTNkZGI4OThlMjZhZSIsInB1YmxpY2F0aW9uX2lkIjoiZTE2ZDllMzktYTg3MC00NDBhLThiMzEtODk1ZTA0ZjUzYzgwIiwidmlzaXRfdG9rZW4iOiI2MGRiMTk2Ni1hZmM2LTQzNGYtODFlNy1jZTNiY2JlMTQ2YjQiLCJpYXQiOjE3MTU2Mzc1NjEsImlzcyI6Im9yY2hpZCJ9.b_aypbe3rG41cSUXtPevnT-MlPYRCshuLj4BplhAagM#amltaEBtZXllcnRvb2wuY29t
Resource
win10v2004-20240508-en
General
-
Target
https://flight.beehiiv.net/v2/clicks/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1cmwiOiJodHRwczovL2UtdG9sbC5jby56YS9hdXRvbXMtZW1haWxzP3V0bV9zb3VyY2U9am9uYWhzLW5ld3NsZXR0ZXItMTUwNGE1LmJlZWhpaXYuY29tJnV0bV9tZWRpdW09cmVmZXJyYWwmdXRtX2NhbXBhaWduPW5ldy1wb3N0IiwicG9zdF9pZCI6ImZjNjI2MDkwLTY3MTEtNDYzZS1iNDBiLTNkZGI4OThlMjZhZSIsInB1YmxpY2F0aW9uX2lkIjoiZTE2ZDllMzktYTg3MC00NDBhLThiMzEtODk1ZTA0ZjUzYzgwIiwidmlzaXRfdG9rZW4iOiI2MGRiMTk2Ni1hZmM2LTQzNGYtODFlNy1jZTNiY2JlMTQ2YjQiLCJpYXQiOjE3MTU2Mzc1NjEsImlzcyI6Im9yY2hpZCJ9.b_aypbe3rG41cSUXtPevnT-MlPYRCshuLj4BplhAagM#amltaEBtZXllcnRvb2wuY29t
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]