{ "id": "CASE-2026-0003", "memory_type": "case", "scenario": "phishing", "title": "Executive impersonation email requested urgent wire transfer", "abstract": "An executive impersonation email targeted finance staff with an urgent wire transfer request from a lookalike domain.", "verdict": "true_positive", "severity": "high", "entities": { "users": [ "carol@corp.example" ], "hosts": [ "FIN-LAPTOP-08" ], "mailboxes": [ "carol@corp.example" ] }, "observables": { "sender_emails": [ "ceo@c0rp-example.com" ], "domains": [ "c0rp-example.com" ], "urls": [], "ips": [ "203.0.113.45" ], "hashes": [] }, "evidence": [ "Lookalike domain used numeric substitution.", "Language pressure matched prior BEC pattern.", "No historical communication from sender domain." ], "patterns": [ "verdict:true_positive", "scenario:phishing", "alert_type:mail_bec_impersonation" ], "related_refs": { "playbooks": [ "PB-PHISH-001" ], "kb": [ "KB-CRED-HARVEST-PATTERNS" ], "cases": [] }, "source_path": "/home/tom/soc_memory_poc/evaluation/datasets/mock_cases/phishing/CASE-2026-0003.json", "tags": [ "phishing", "bec", "executive-impersonation" ] }