
Description: Your email address has been leaked and you receive an email from Paypal in German. Try to analyze the suspicious email.
Level: Easy
Category: Email Analysis
Link: https://app.letsdefend.io/challenge/phishing-email
Tactics: Initial Access, Execution, Credential Access, Collection, Command and Control, Impact
Tools: VirusTotal, Curl, Thunder Bird, EmailAnalytics
In this writeup we will be analyzing a email to determine whether it was a phishing attempt or not. We will only use a mail client(You can use any you like) and avail Threat intel platforms like virustotal and cisco talos intelligence
Solution: bounce@rjttznyzjjzydnillquh.designclub.uk.com.
Step 1: Open Paypal.eml file in Thundermail.
Step 2: Open and Analyse the Paypal.txt file then find the domain.
Solution: storage.googleapis.com.
Step 1: Copy Blue Button link then paste in newly created file Paypal.txt.
Step 2: Open and Analyse the Paypal.txt file then find the domain.
Solution: yes.
Step 1: Search domain storage.googleapis.com on Virustotal site then analyse the report.
Solution: 13945ecc33afee74ac7f72e1d5bb73050894356c4bf63d02a1a53e76830567f5.
Step 1: Select Details -> Scroll down and analyse the report.
Step 2: Find the Body SHA-256 Tag.
Solution: Yes.
The investigation into the provided email has successfully identified it as a phishing attempt. By examining the email's headers, specifically the return path (bounce@rjttznyzjjzydnillquh.designclub.uk.com), and the domain associated with the embedded link (storage.googleapis.com), we were able to find multiple indicators of compromise.
The domain storage.googleapis.com itself is not inherently malicious, as it's a legitimate Google service. However, threat actors often abuse such services to host malicious content, a common technique known as "living off the land." This makes detection more difficult as the domain appears trustworthy. The VirusTotal analysis of the domain's body SHA-256 (13945ecc33afee74ac7f72e1d5bb73050894356c4bf63d02a1a53e76830567f5) would likely reveal its association with malicious files or activities, further confirming our suspicion.
This case serves as a practical example of how to conduct an initial email analysis using simple tools like a mail client and threat intelligence platforms. It highlights the importance of scrutinizing every element of a suspicious email, from the sender's address to the linked URLs, and how even seemingly benign domains can be part of a larger malicious scheme. The ability to recognize these signs is a crucial skill in cybersecurity for preventing unauthorized access and data breaches.