Let’s find the C2 addresses on VirusTotal’s “BEHAVIOR” tab inside the file report.
When multiple sandboxes agree, you usually get the correct C2 addresses.
Used the filter URL and found that: Yes, the computer did connect to the C2 server. It ran the malware and got infected. Looks like we’ll need to initiate containment on that endpoint.
Added the IP of the SMTP server from which we received the phishing email. If we had more artifact locations, I’d add the phishing address and malware hashes, too.
Quick analyst note: “Phishing was received and run by the end user. C2 traffic exists in logs. The email has been deleted, and the endpoint containment was initiated.”
Playbook finish!
Alert finish; with note: “Phishing was received and run. Malware. True Positive. Email deleted. Endpoint containment initiated.”