General

  • Target

    https://es.unisys.splunkcloud.com/en-US/app/SplunkEnterpriseSecuritySuite/search?q=search%20index%3Dnetwork_meraki_secappliances%20eventData.categories%20IN%20(%22Filter%20Avoidance%2C%20Streaming%20Video%22%2C%20%22Peer%20File%20Transfer%2C%20Phishing%22%2C%20%22Phishing%2C%20Malware%20Sites%22%2C%20%22Spam%2C%20Phishing%22%2C%20%22Online%20Storage%20and%20Backup%2C%20Web-based%20Email%22)%20%20clientId%3Dk50878a&earliest=-24h%40h&latest=now&sid=1724286073.266024_4C07D35E-78DA-4EFF-991B-4437F5E3AC6D&display.page.search.mode=verbose&dispatch.sample_ratio=1#

Score
8/10

Malware Config

Signatures

  • A potential corporate email address has been identified in the URL: -24h@h

Files