General
-
Target
https://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
-
Sample
241205-tle5fsxqhr
Score
10/10
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
Resource
win11-20241007-en
12 signatures
300 seconds
Malware Config
Targets
-
-
Target
https://firebasestorage.googleapis.com/v0/b/serverdata-755d3.appspot.com/o/WEBLOG%2Funiversal.html?alt=media&token=12b7447a-c645-4c92-904c-9ed3ffa4e384#[email protected]
-
A potential corporate email address has been identified in the URL: X@K8
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-