URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure-web.cisco.com/1AmVTTkVueSJXl2KFOTxfACeO3pXdbdBCTnAJv8CDP5oZJd3VA1wwo7D83gtcCxFUo1FaiSs9jLf3eyEJbUi3S22I5A7nCttwzLpjTOwcMtr6rdLjABi9B2qN9GrTRWCoGssjRxrwaJMMC1sVpGnTH5WLC8-hRTR8bbGuZPJkizVF_GcOoHk5sCGOmpyHOI8cMHYDHyIIdOcj2hKIHbop9ubVO7xX_2Io6UetbU2GwaPkTrqd3hEMnq6f8djcpbuqT3swnzEiVRacvSmJ4aVcXdHwjGKnAHd26I8FoV5ZbE8xo7o0Io3JL95Q6jb17KGLewuxw9o9amYO4Xk3yJT4anuX4Ly9cuFGdOd2PrmhlHwkIb_QlwRqifdS7jU1mWo41YPPwirmeREC7DQfl2mwv8MgyKbbH_Y-El2q7B_QgjUcVn8SgOGAD7Z_qDrFXpK7/https%3A%2F%2Fhcm22.sapsf.com%2Fsf%2Fhrisworkflowapprovelink%3FworkflowRequestId%3DV4-0-a1-8FQL9CEpXi2vVNzSSRSMXQn7SXAcmLx1okqVVCcE3FGk%26company%3Dgulfbusine%26username%3Daabdellatif%40consultants.km.qa%27 style=
Resource
win10v2004-20240709-en
General
-
Target
https://secure-web.cisco.com/1AmVTTkVueSJXl2KFOTxfACeO3pXdbdBCTnAJv8CDP5oZJd3VA1wwo7D83gtcCxFUo1FaiSs9jLf3eyEJbUi3S22I5A7nCttwzLpjTOwcMtr6rdLjABi9B2qN9GrTRWCoGssjRxrwaJMMC1sVpGnTH5WLC8-hRTR8bbGuZPJkizVF_GcOoHk5sCGOmpyHOI8cMHYDHyIIdOcj2hKIHbop9ubVO7xX_2Io6UetbU2GwaPkTrqd3hEMnq6f8djcpbuqT3swnzEiVRacvSmJ4aVcXdHwjGKnAHd26I8FoV5ZbE8xo7o0Io3JL95Q6jb17KGLewuxw9o9amYO4Xk3yJT4anuX4Ly9cuFGdOd2PrmhlHwkIb_QlwRqifdS7jU1mWo41YPPwirmeREC7DQfl2mwv8MgyKbbH_Y-El2q7B_QgjUcVn8SgOGAD7Z_qDrFXpK7/https%3A%2F%2Fhcm22.sapsf.com%2Fsf%2Fhrisworkflowapprovelink%3FworkflowRequestId%3DV4-0-a1-8FQL9CEpXi2vVNzSSRSMXQn7SXAcmLx1okqVVCcE3FGk%26company%3Dgulfbusine%26username%3Daabdellatif%40consultants.km.qa%27 style=
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: hrisworkflowapprovelinkworkflowRequestIdV40a18FQL9CEpXi2vVNzSSRSMXQn7SXAcmLx1okqVVCcE3FGkcompanygulfbusineusernameaabdellatif@consultants.km.qastyle