URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFllkFdcwfXtYgWwND7qzAvicl6LybxE4KRQ-2FTX9tHsmDZdp9m7gyrEvHAf-2FcH2KPQQ-3D-3D-TVk_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZP6if6nFyRUVbsGNF0-2FgwGBrC62I8SIiAepkVtqKSU4XNV98Grag3daaWPbBiyiUQ1YSumXoGTOmBSzcQEBD13krL8kFNZ-2BE-2F4e-2BbDyHL9-2B-2BNSQFLZnxoclWJkvOk3U6cWJLUgLWbVW0jCukMeU88n7TS-2FB-2BBusnZ8chbKzXaj7qvNoKVN3EKIZqMjerYlDEw1hx8BEsHGCS5REelK3Q-2FL5bbrknrEhVfKAR6jfWwxQuHxvJWalEDfQgIIiI2cjUrM-3D#ZmVsaWNpYS5nYXJjaWFAZnJlc25vLmdvdg==
Resource
win10v2004-20240802-en
General
-
Target
https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFllkFdcwfXtYgWwND7qzAvicl6LybxE4KRQ-2FTX9tHsmDZdp9m7gyrEvHAf-2FcH2KPQQ-3D-3D-TVk_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZP6if6nFyRUVbsGNF0-2FgwGBrC62I8SIiAepkVtqKSU4XNV98Grag3daaWPbBiyiUQ1YSumXoGTOmBSzcQEBD13krL8kFNZ-2BE-2F4e-2BbDyHL9-2B-2BNSQFLZnxoclWJkvOk3U6cWJLUgLWbVW0jCukMeU88n7TS-2FB-2BBusnZ8chbKzXaj7qvNoKVN3EKIZqMjerYlDEw1hx8BEsHGCS5REelK3Q-2FL5bbrknrEhVfKAR6jfWwxQuHxvJWalEDfQgIIiI2cjUrM-3D#ZmVsaWNpYS5nYXJjaWFAZnJlc25vLmdvdg==
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]