← Back to Index

LetsDefend - Email Analysis

Created: 23/02/2024 11:00 Last Updated: 05/06/2024 20:52


**Email Analysis** ![3a700eec6de3390ca5ff31dbcc67dbe3.png](/resources/3a700eec6de3390ca5ff31dbcc67dbe3.png)

You recently received an email from someone trying to impersonate a company, your job is to analyze the email to see if it is suspicious.

Email Link: ~~Download~~ C:\Users\LetsDefend\Desktop\Files\BusinessEmail.zip Password: infected

Attachment: ~~Download~~ C:\Users\LetsDefend\Desktop\Files\unitedscientificequipent.zip Password: infected

This challenge prepared by ZaadoOfc


Start Investigation

After downloaded both file, I started by parsing the eml file on Email Viewer and opened it on vscode at the same time

![17abf6d9ed26b2bfb3570d67e7c63d11.png](/resources/17abf6d9ed26b2bfb3570d67e7c63d11.png) ![a1d8c7d632e781e8590bd5a4ad52fa20.png](/resources/a1d8c7d632e781e8590bd5a4ad52fa20.png) Online Email Reader works as a charm, this is what it should look like ![55076133c368cf5884b0b0a9460fba24.png](/resources/55076133c368cf5884b0b0a9460fba24.png) Looking at the header it seems like the sender was not hide the actual email

Looking at the contents it says that there is an attachment came with it and the sender told the recipient to confirm it

![36d75b63ef17b9ce9ab28a2cd3c23ffd.png](/resources/36d75b63ef17b9ce9ab28a2cd3c23ffd.png) Since the sender IP address could be seen on the email header, I searched this IP for the location and this IP address located in the Vancouver from Canada.

Now it's time to analyze the email attachment

![5ae2689681a19fa10575d120fe26a7db.png](/resources/5ae2689681a19fa10575d120fe26a7db.png) Just at first gland, it's obviously a hugh red flag right there, it's not an image file or document file but an exe file ![8e0810c2b30bffcf6c84a9d8485b83b8.png](/resources/8e0810c2b30bffcf6c84a9d8485b83b8.png) ![11b34a6e6e6b627c86e52b9e80163a58.png](/resources/11b34a6e6e6b627c86e52b9e80163a58.png) I threw it to pestudio and found that this file does 3 MITRE techniques ![57ab04d852fb2675eee7b8e36449704e.png](/resources/57ab04d852fb2675eee7b8e36449704e.png) Then I searched the hash on [VirusTotal](https://www.virustotal.com/gui/file/9909753bfb0ac8ab165bab3555233d03b01a9274a92e57c022f87ccbe51ca415), Sure enough that this file is malicious and these vendors labels it as [Loki](https://success.trendmicro.com/dcx/s/solution/1117830-loki-malware-information?language=en_US)

So our investigation concluded here


What is the sending email address?

yanting@united.com.sg

What is the email address of the recipient?

admin@malware-traffic-analysis.net

What is the subject line of the email?

united scientific equipment

What date was the Email sent? Date format: MM/DD/YYYY

02/08/2021

What is the originating IP?

71.19.248.52

What country is the ip address from?

Canada

What is the name of the attachment when you unzip it? (with extension)

united scientific equipent.exe

What is the sha256 hash of the File?

9909753BFB0AC8AB165BAB3555233D03B01A9274A92E57C022F87CCBE51CA415

Is the email attachment malicious? Yes/No

Yes

Summary

The phishing email was sent to admin which the sender was from Canada and doesn't hide the actual mail, but the attachment that shipped with it is a malicious PE file labeled as LOKI, the infamous info-stealer some various also act as a ransomware

![f2173ce633562072c6459a91e2cd3d0a.png](/resources/f2173ce633562072c6459a91e2cd3d0a.png)