AbbySec

My digital playground – where hacking meets learning.

View on GitHub
25 March 2026

SOC105 – Suspicious URL Request (Firewall Test Activity)

by

🧠 Summary

This investigation was triggered by a SOC105 – Requested T.I. URL Address alert involving a request to an external IP address (115.99.150.132) hosting a suspicious resource.

Initial threat intelligence checks showed moderate detections on VirusTotal; however, sandbox analysis (AnyRun) revealed no malicious behavior.

Further investigation identified that the request was blocked by the firewall, and the user agent string explicitly indicated a testing scenario:
Firewall Test - Dont Block.

Based on all findings, the activity was determined to be part of a controlled firewall/security test, not an actual attack.


🚨 Alert Overview


🔍 Investigation Steps

1️⃣ URL Analysis

http://115.99.150.132:56841/Mozi.m

URL VT Result

⚠️ Observation: Moderate detection → requires further validation.


2️⃣ Sandbox Analysis (AnyRun)

AnyRun Result

Conclusion: No runtime malicious activity.


3️⃣ Hybrid Analysis Check

Hybrid Analysis

⚠️ Conclusion: Intelligence is stale / not reliable alone.


4️⃣ Log Analysis (Critical Step)

Raw log findings:

Request URL: http://115.99.150.132:56841/Mozi.m

Raw Log

🔥 Key Insight:


⚠️ Final Verdict

Category Result
URL Reputation Suspicious
Sandbox Result No Malicious Behavior
Firewall Action Blocked
Context Security Test Activity
Impact None
Severity Low
Verdict ⚠️ Benign (Security Test / False Positive Context)

🛡️ Actions Taken


📌 Conclusion

This alert represents a controlled security test rather than an actual attack.

The investigation revealed:

Suspicious URL → Blocked by Firewall → No Execution → Test Indicator Present

Despite moderate threat intelligence detections, the absence of malicious behavior and the presence of a test-specific user agent strongly indicate that this was an intentional simulation or validation activity.

This case highlights the importance of:


tags: