URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFp1nSDobFplds1CfmnPpiYyC2i7S-2BUo48qU1YmbouRj0Bi1maxHqpfcTmPodXCHkCQ-3D-3DfoQy_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZN0sOyTQlU5AHiXOr9K1loMImEIclPesVTAtCKNGyYylDtJlwHwZ9o7XQxpGyZO9Z9MxUoqirXoqGZo45tqnkBKHrUBzAXNNzLseC0HtfOrVcEoykZppAqPfQXXbgYeg2m3TfmVlG23dhMnzQKOjpHGeOZelWIR-2BACgdGA0GV6wH80u9GkKtOgOC16ZXzcltmsFL97zgN-2FA5GbqNZZTg9PhRwCHmWvoUYO4XdI9hnNlgR-2FV-2F8CjSZdZ0QR4EHHOSGs-3D#am9obi5yYXlAZ3JlYXRsYWtlc2NoZWVzZS5jb20=
Resource
win10v2004-20240802-en
General
-
Target
https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFp1nSDobFplds1CfmnPpiYyC2i7S-2BUo48qU1YmbouRj0Bi1maxHqpfcTmPodXCHkCQ-3D-3DfoQy_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZN0sOyTQlU5AHiXOr9K1loMImEIclPesVTAtCKNGyYylDtJlwHwZ9o7XQxpGyZO9Z9MxUoqirXoqGZo45tqnkBKHrUBzAXNNzLseC0HtfOrVcEoykZppAqPfQXXbgYeg2m3TfmVlG23dhMnzQKOjpHGeOZelWIR-2BACgdGA0GV6wH80u9GkKtOgOC16ZXzcltmsFL97zgN-2FA5GbqNZZTg9PhRwCHmWvoUYO4XdI9hnNlgR-2FV-2F8CjSZdZ0QR4EHHOSGs-3D#am9obi5yYXlAZ3JlYXRsYWtlc2NoZWVzZS5jb20=
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]