URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mathhog.xyz/service/go/hvtrs8%2F-wuw%2Cmctjhmg%2Cx%7Bz-sgrtiae-gm%2Fjvvrq8'2D-uuu%250Cocvjjme%250Cz%255Bx-qgptkag-em'2Djtvpq%3A'0D%2Fuwu'270Aoavhjoe'270Az'275%40x%2Fqepvkcg%2Feo'0Dhttps%251A%250F%250Fwww'072Amathhog'072Ax'077%2560z%250Fservice%250Fgo%250Fhvtrs'271C%25052F'270Dwuw%25052Cmctjhmg%25052Cx%25057'2762z'270Dsgrtiae'270Dgm%25052Fjvvrq'073C'27072D'072Duuu%2505250Cocvjjme%2505250Cz%2505255'0742x'072Dqgptkag'072Dem'27072Djtvpq%25053A'07270D%25052Fuwu'2707270Aoavhjoe'2707270Az'2707275%250540x%25052Fqepvkcg%25052Feo'07270Dhttps%2505251A%2505250F%2505250Fsupergolf'0727072Dro'27072742lox'2707270Afandom'0727072Acom%2505250Fwiki%2505250FLevels
Resource
win10v2004-20240426-en
General
-
Target
https://www.mathhog.xyz/service/go/hvtrs8%2F-wuw%2Cmctjhmg%2Cx%7Bz-sgrtiae-gm%2Fjvvrq8'2D-uuu%250Cocvjjme%250Cz%255Bx-qgptkag-em'2Djtvpq%3A'0D%2Fuwu'270Aoavhjoe'270Az'275%40x%2Fqepvkcg%2Feo'0Dhttps%251A%250F%250Fwww'072Amathhog'072Ax'077%2560z%250Fservice%250Fgo%250Fhvtrs'271C%25052F'270Dwuw%25052Cmctjhmg%25052Cx%25057'2762z'270Dsgrtiae'270Dgm%25052Fjvvrq'073C'27072D'072Duuu%2505250Cocvjjme%2505250Cz%2505255'0742x'072Dqgptkag'072Dem'27072Djtvpq%25053A'07270D%25052Fuwu'2707270Aoavhjoe'2707270Az'2707275%250540x%25052Fqepvkcg%25052Feo'07270Dhttps%2505251A%2505250F%2505250Fsupergolf'0727072Dro'27072742lox'2707270Afandom'0727072Acom%2505250Fwiki%2505250FLevels
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: uwu'270Aoavhjoe'270Az'275@x