# PhishStrike Write-up

**Scenario**:

As a cybersecurity analyst for an educational institution, you receive an alert about a phishing email targeting faculty members. The email, appearing from a trusted contact, claims a $625,000 purchase and provides a link to download an invoice.

Your task is to investigate the email using Threat Intel tools. Analyze the email headers and inspect the link for malicious content. Identify any Indicators of Compromise (IOCs) and document your findings to prevent potential fraud and educate faculty on phishing recognition.

**Tools**:

* Email Header Analyzer
* URLHaus
* [URLScan.io](http://urlscan.io/)
* VirusTotal
* MalwareBazaar

Link: [https://cyberdefenders.org/blueteam-ctf challenges/phishstrike/](https://cyberdefenders.org/blueteam-ctf-challenges/phishstrike/)

Writeup In Medium: <https://medium.com/@GLITCHGC/phishstrike-write-up-767d44fe3e97>

## Okay Let’s Move on! <a href="#id-2ecf" id="id-2ecf"></a>

<figure><img src="https://miro.medium.com/v2/resize:fit:320/1*OUVtzf0OeazIjql5EN6Sfw.gif" alt="" height="193" width="320"><figcaption></figcaption></figure>

## Questions: <a href="#b27f" id="b27f"></a>

> ***1. Identifying the sender’s IP address with specific SPF and DKIM values helps trace the source of the phishing email. What is the sender’s IP address that has an SPF value of softfail and a DKIM value of fail ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*ZPyYWA_rY9ztHlA6-ma2Yw.png" alt="" height="524" width="700"><figcaption></figcaption></figure>

In this i used [phishtool.com](http://phishtool.com/) site

<figure><img src="https://miro.medium.com/v2/resize:fit:625/1*ddRfMT6UhTzN2qhBA-SOrw.png" alt="" height="713" width="625"><figcaption></figcaption></figure>

Go to **Security** Tap and you will find it (***The answer will be highlight***)

> **Answer: 18.208.22.104**

> ***2. Understanding the return path of the email helps in tracing its origin. What is the return path specified in this email ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:621/1*QDfEGKxVjkwrd5GpbS7FvQ.png" alt="" height="538" width="621"><figcaption></figcaption></figure>

> **Answer: <erikajohana.lopez@uptc.edu.co>**

> ***3. Identifying the source of malware is critical for effective threat mitigation and response. What is the IP address hosting the malicious file associated with malware distribution ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:624/1*fg9zdWFCAWdwvB5zPY9NJg.png" alt="" height="246" width="624"><figcaption></figcaption></figure>

> **Answer: 107.175.247.199**

> ***4. Identifying malware that exploits system resources for cryptocurrency mining is critical for prioritizing threat mitigation efforts. The malicious URL can deliver several malware types. Which malware family is responsible for cryptocurrency mining ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*7pjQwylNLIalPc5DiTq4Iw.png" alt="" height="405" width="700"><figcaption></figcaption></figure>

Can you use [urlhaus.abuse.ch](http://urlhaus.abuse.ch/) to check

> **Answer: CoinMiner**

> ***5. Identifying the specific URLs malware requests is key to disrupting its communication channels and reducing its impact. Based on the previous analysis of the cryptocurrency malware sample, what does this malware request the URL?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*zUvesHX3ZLySwA-xdwBn8g.png" alt="" height="534" width="700"><figcaption></figcaption></figure>

Ok after a little research, from [urlhaus.abuse.ch](http://urlhaus.abuse.ch/) I got the sha256 hash for the malware *453fb1c4b3b48361fa8a67dcedf1eaec39449cb5a146a7770c63d1dc0d7562f0*

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*HYNSFQQFcaxXdxW_q4K58g.png" alt="" height="356" width="700"><figcaption></figcaption></figure>

And put it in [Virustotal ](https://www.virustotal.com/)and look for **Relations** tap and i get it

> **Answer:** [**http://ripley.studio/loader/uploads/Qanjttrbv.jpeg**](http://ripley.studio/loader/uploads/Qanjttrbv.jpeg)

> ***6. Understanding the registry entries added to the auto-run key by malware is crucial for identifying its persistence mechanisms. Based on the BitRAT malware sample analysis, what is the executable’s name in the first value added to the registry auto-run key ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*uKFhsxtvpamAS3Fg88pD2w.png" alt="" height="529" width="700"><figcaption></figcaption></figure>

This one choose BitRat Signature and copy the SHA256

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*X7_pOMIwrTng2w3D7ZTv-w.png" alt="" height="490" width="700"><figcaption></figcaption></figure>

go to [bazaar.abuse.ch](http://bazaar.abuse.ch/) and search for sha256:bf7628695c2df7a3020034a065397592a1f8850e59f9a448b555bc1c8c639539

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*3HCGdZZpDyITiokhnFuwZA.png" alt="" height="488" width="700"><figcaption></figcaption></figure>

scroll down to get the [ANY.RUN](http://any.run/) report

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*6vH1MJA6KYETvzSREyoASA.png" alt="" height="481" width="700"><figcaption></figcaption></figure>

Simple analysis and you will find it

> **Answer: Jzwvix.exe**

> ***7. Analyzing the HTTP requests made by malware helps in identifying its communication patterns. What is the HTTP request used by the loader to retrieve the BitRAT malware ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*ODNmsHjj0QpJdEa3sFM4NA.png" alt="" height="478" width="700"><figcaption></figcaption></figure>

will find it in HTTP Requests Tap

> **Answer:** [**http://107.175.247.199/loader/server.exe**](http://107.175.247.199/loader/server.exe)

> ***8. Identifying the SHA-256 hash of files downloaded by a malicious URL aids in tracking and analyzing malware activities. According to the BitRAT analysis, what is the SHA-256 hash of the second file downloaded and added to autorun keys ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*aQiBGSApYCLqf8_qtZyMug.png" alt="" height="478" width="700"><figcaption></figcaption></figure>

We know that the first was Jzwvix.exe. To know the second, you can check the processes as in the previous image

> **Answer:bf7628695c2df7a3020034a065397592a1f8850e59f9a448b555bc1c8c639539**

> ***9. Introducing a delay in malware execution can help evade detection mechanisms. What is the delay (in seconds) caused by the PowerShell command according to the BitRAT analysis ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:426/1*PEBK24PYyxrwoSFiSV_f1w.png" alt="" height="615" width="426"><figcaption></figcaption></figure>

copy this base64 code and let’s decoded

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*OQF6omHxzeOJIOx-fm9tmg.png" alt="" height="478" width="700"><figcaption></figcaption></figure>

I use [cyberChef](https://gchq.github.io/CyberChef/) for this and as you see output is “start sleep seconds 50”

> **Answer: 50**

> ***10. Tracking the command and control (C2) domains used by malware is essential for detecting and blocking malicious activities. What is the C2 domain used by the BitRAT malware ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*YJ1Lbi0GxJQCIdn2wvZ_MQ.png" alt="" height="375" width="700"><figcaption></figcaption></figure>

check DNS Requests Tap to find the answer

> **Answer:** [**gh9st.mywire.org**](http://gh9st.mywire.org/)

> ***11. Understanding the methods malware uses for exfiltrating data is crucial for detecting and preventing data breaches. According to the AsyncRAT analysis, what is the Telegram Bot ID used by the malware to exfiltrate stolen data ?***

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*wuDo5-oO78dftFWb4CgSzw.png" alt="" height="486" width="700"><figcaption></figcaption></figure>

Back to <https://urlhaus.abuse.ch/url/2381718/> but this time will choose AsyncRAT, after search in the previous site i don’t find anything, So I decided to use another platform like [tria.ge](http://tria.ge/)

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*or6CgkJjGO8V4mKLl9a__A.png" alt="" height="531" width="700"><figcaption></figcaption></figure>

go to the report in [tria.ge](https://tria.ge/221025-mz5tpscdf8/behavioral2), and scroll down to get Network section and as you see in previous image the malware use BOTID to exfiltrate stolen data

> **Answer: bot5610920260**

<figure><img src="https://miro.medium.com/v2/resize:fit:700/1*UnBCFw2R5iT5-WhSsbmAwg.png" alt="" height="481" width="700"><figcaption></figcaption></figure>
