Malware Signature Match
Low
False Positive
ALR-00287 · 2026-04-08T06:16:54Z
Description
Known malware signature (Emotet variant) detected in file on WS-LAP-010. Cloud Connector quarantined the file. User context: r.davies.
Alert Metadata
Endpoint Information
MITRE ATT&CK Mapping
Investigation Timeline
06:16:54
Event ingested by SOC365 Engine
06:16:58
EmilyAI triage started — correlation enrichment
06:17:03
EmilyAI confidence: 96% — escalated to human analyst
06:17:18
Alert assigned to analyst: EmilyAI (auto)
06:18:08
Investigation started — querying SIEM and threat intelligence
06:22:06
Containment action taken — endpoint isolated
06:33:13
Alert resolved — remediation complete
Related Alerts
| ID | Time | Alert | Severity | Status | Host |
|---|---|---|---|---|---|
| ALR-00204 | 12h ago | Insider Threat Indicator | Informational | Open | WS-LAP-010 |
| ALR-00374 | 22h ago | Anomalous DNS Query | Informational | False Positive | WS-LAP-010 |
| ALR-00169 | 1d ago | Malware Signature Match | Medium | Open | WS-PC-003 |
| ALR-00305 | 1d ago | Credential Stuffing Attempt | Low | Escalated | WS-LAP-010 |
| ALR-00103 | 1d ago | Suspicious PowerShell Execution | Medium | Investigating | WS-LAP-010 |