BTLO - Phishing Analysis

BTLO - Phishing Analysis

Challenge: https://blueteamlabs.online/home/challenge/phishing-analysis-f92ef500ce

Scenario

A user has received a phishing email and forwarded it to the SOC. Can you investigate the email and attachment to collect useful artifacts?

Tools

  • Text Editor
  • Mozilla Thunderbird
  • URL2PNG
  • WHOis

Q1

Who is the primary recipient of this email?

Recon

這一題可以直接用線上工具 - EML Viewer把eml file轉成pdf,不過風險就是有很多的資訊會流失掉,所以比較好的方式就是直接裝Mozilla Thunderbird查看 圖片

Flag: kinnar1975@yahoo.co.uk

Q2

What is the subject of this email?

Recon

呈上題 圖片

Flag: Undeliverable: Website contact form submission

Q3

What is the date and time the email was sent?

Recon

呈上題 圖片

Flag: 18 March 2021 04:14

Q4

What is the Originating IP?

Recon

這個就是要用Text Editor string search Originating就會發現這個IP 圖片

Flag: 103.9.171.10

Q5

Perform reverse DNS on this IP address, what is the resolved host? (whois.domaintools.com)

Recon

直接用線上工具看這個IP的相關資訊 圖片

Flag: c5s2-1e-syd.hosting-services.net.au

Q6

What is the name of the attached file?

Recon

呈第一題可以發現有一個attachment 圖片

Flag: Website contact form submission.eml

Q7

What is the URL found inside the attachment?

Recon

呈上題,點進這個附件可以看到一段URL 圖片

Flag: https://35000usdperwwekpodf.blogspot.sg?p=9swghttps://35000usdperwwekpodf.blogspot.co.il?o=0hnd

Q8

What service is this webpage hosted on?

Recon

呈上題,這個我是參考1的說明,可以觀察釣魚的網址

Flag: blogspot

Q9

Using URL2PNG, what is the heading text on this page? (Doesn’t matter if the page has been taken down!)

Recon

這個就直接看線上工具 - URL2PNG 圖片

Flag: Blog has been removed

Reference