General
-
Target
https://www.splunk.com/en_us/form/gartner-magic-quadrant-for-observability-platforms.html?utm_campaign=google_amer_en_search_competitor_observability_devops&utm_source=google&utm_medium=cpc&utm_content=Gartner_MQ_O11y_2024&utm_term=prometheus%20monitoring&device=c&_bt=709845446834&_bm=p&_bn=g&gad_source=1&gbraid=0AAAAAD8kDz3LyBEyFXRpr3TsR-dK1xGDX&gclid=EAIaIQobChMIz6PDvZDpiQMVZVz_AR3h8iBEEAAYAiAAEgKG6PD_BwE
-
Sample
241119-x849ms1hjp
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.splunk.com/en_us/form/gartner-magic-quadrant-for-observability-platforms.html?utm_campaign=google_amer_en_search_competitor_observability_devops&utm_source=google&utm_medium=cpc&utm_content=Gartner_MQ_O11y_2024&utm_term=prometheus%20monitoring&device=c&_bt=709845446834&_bm=p&_bn=g&gad_source=1&gbraid=0AAAAAD8kDz3LyBEyFXRpr3TsR-dK1xGDX&gclid=EAIaIQobChMIz6PDvZDpiQMVZVz_AR3h8iBEEAAYAiAAEgKG6PD_BwE
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
https://www.splunk.com/en_us/form/gartner-magic-quadrant-for-observability-platforms.html?utm_campaign=google_amer_en_search_competitor_observability_devops&utm_source=google&utm_medium=cpc&utm_content=Gartner_MQ_O11y_2024&utm_term=prometheus%20monitoring&device=c&_bt=709845446834&_bm=p&_bn=g&gad_source=1&gbraid=0AAAAAD8kDz3LyBEyFXRpr3TsR-dK1xGDX&gclid=EAIaIQobChMIz6PDvZDpiQMVZVz_AR3h8iBEEAAYAiAAEgKG6PD_BwE
-
A potential corporate email address has been identified in the URL: 3F2A2CCB574872387F000101@AdobeOrg_63858881313752152872772150097208577471
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-