General
-
Target
https://vx1ziaadq-xn--qz2lyx6b-xn----c1a2cj-xn----p1ai.translate.goog/LN89cNOo/4xZqw/EbRpE?YVhOMGIyeDBaVUJtZEM1dVpYZDViM0pyYkdsbVpTNWpiMjA9OmRMelZi+&_x_tr_sch=http&_x_tr_sl=IWCmsHYb&_x_tr_tl=uyqizsMu
-
Sample
250106-g4qmpa1lak
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vx1ziaadq-xn--qz2lyx6b-xn----c1a2cj-xn----p1ai.translate.goog/LN89cNOo/4xZqw/EbRpE?YVhOMGIyeDBaVUJtZEM1dVpYZDViM0pyYkdsbVpTNWpiMjA9OmRMelZi+&_x_tr_sch=http&_x_tr_sl=IWCmsHYb&_x_tr_tl=uyqizsMu
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
https://vx1ziaadq-xn--qz2lyx6b-xn----c1a2cj-xn----p1ai.translate.goog/LN89cNOo/4xZqw/EbRpE?YVhOMGIyeDBaVUJtZEM1dVpYZDViM0pyYkdsbVpTNWpiMjA9OmRMelZi+&_x_tr_sch=http&_x_tr_sl=IWCmsHYb&_x_tr_tl=uyqizsMu
-
A potential corporate email address has been identified in the URL: [email protected]
-