General

  • Target

    http://amp/s/%E2%80%8Bma%C2%ADgick%C2%ADnum%C2%ADbers%E2%80%8B.%C2%ADc%C2%ADo%C2%ADm%E2%80%8B.%C2%ADa%C2%ADu/dayo/xwt4n/c2ltb25lQHVuaGNyLm9yZw==$%C3%A3%E2%82%AC%E2%80%9A&data=05|02|[email protected]|8b9c231d49c941ffb9e708dcd09e32b0|e5c37981666441348a0c6543d2af80be|0|0|638614625085789921|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|0|||&sdata=sXuvh22weTsmE3fWLomP/lUNLGDmLcKxfgpre5XAdv4=&reserved=0

Score
8/10

Malware Config

Signatures

  • A potential corporate email address has been identified in the URL: c2ltb25lQHVuaGNyLm9yZw==$。&data=05|02|[email protected]|8b9c231d49c941ffb9e708dcd09e32b0|e5c37981666441348a0c6543d2af80be|0|0|638614625085789921|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|0|||&sdata=sXuvh22weTsmE3fWLomP

Files