A SOC analyst is investigating a recent email delivered to a high-value user for a customer whose network their organization monitors. The email includes a suspicious attachment titled ''Invoice RE: 0004489''. The
hash of the file is gathered from the Cisco Email Security Appliance. After searching Open Source Intelligence, no available history of this hash is found anywhere on the web. What is the next step in analyzing this attachment to allow the analyst to gather indicators of compromise?
Millie
1 months agoZena
3 days agoChandra
4 days agoDanilo
5 days agoBrent
11 days agoCelestine
20 days agoFanny
2 months agoMaryanne
3 days agoTennie
4 days agoHelaine
18 days agoHubert
2 months agoMing
2 months agoGoldie
2 months agoLeslee
2 months agoGerald
2 months agoDenise
3 months agoLaura
3 months agoRosendo
3 months ago