General
-
Target
http://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
-
Sample
241202-wev87svmht
Score
10/10
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
Resource
win10v2004-20241007-en
10 signatures
150 seconds
Malware Config
Targets
-
-
Target
http://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
-
A potential corporate email address has been identified in the URL: Poppinsitalwght@010002000300040005000700080009001500
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-