AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
25 March 2026

SOC105 โ€“ Suspicious URL Request (Bitly Redirect โ€“ Benign Activity)

by

๐Ÿง  Summary

This investigation was triggered by a SOC105 โ€“ Requested T.I. URL Address alert involving a shortened URL (bit.ly/TAPSCAN).

Initial threat intelligence flagged the URL as suspicious; however, deeper analysis revealed that it redirected to a legitimate Google Play Store application (TapScanner).

Further validation using VirusTotal, AnyRun, and Hybrid Analysis showed no malicious behavior.

The activity was determined to be benign user activity, and the alert was classified as a False Positive.


๐Ÿšจ Alert Overview


๐Ÿ” Investigation Steps

1๏ธโƒฃ URL Analysis

https://bit.ly/TAPSCAN

URL VT Result

โš ๏ธ Observation: Very low detection โ†’ requires deeper validation.


2๏ธโƒฃ Sandbox Analysis (AnyRun)

AnyRun Result

โœ… Conclusion: No malicious behavior detected.


3๏ธโƒฃ Hybrid Analysis

Hybrid Analysis

โœ… Conclusion: No evidence of malicious activity.


4๏ธโƒฃ IP Reputation Analysis

IP Location

โœ… Conclusion: Trusted infrastructure (Bitly service).


5๏ธโƒฃ Traffic Behavior Analysis

โœ… Conclusion: Standard user browsing activity.


โš ๏ธ Final Verdict

Category Result
URL Reputation Low Risk
Sandbox Result Clean
IP Reputation Trusted (Bitly)
Behavior Redirect to Legitimate App
Impact None
Severity Low
Verdict โŒ False Positive

๐Ÿ›ก๏ธ Actions Taken


๐Ÿ“Œ Conclusion

This alert represents a false positive triggered by a shortened URL.

The investigation confirmed:

Bitly URL โ†’ Redirect โ†’ Legitimate Google Play Page โ†’ No Threat

Despite initial suspicion, the activity was purely benign user interaction with a trusted service.

This case highlights the importance of:


tags: