# Phishing Analysis Tools

### <mark style="color:red;">What Information Should We Collect?</mark>

Pertinent information an analyst is to collect from the email header:

* Sender email address
* Sender IP address
* Reverse lookup of the sender IP address
* Email subject line
* Recipient email address (this information might be in the CC/BCC field)
* Reply-to email address (if any)
* Date/time

Afterward, draw attention to the email body and attachment(s) (if any).

2.16.107.24:443Artifacts an analyst needs to collect from the email body:

* Any URL links (if an URL shortener service was used, obtain the real URL link)
* The name of the attachment
* The hash value of the attachment (hash type MD5 or SHA256, preferably the latter)

Warning: Be careful not to click on any links or attachments in the email accidentally.

### <mark style="color:red;">Email Header Analysis</mark>

Some information to collect can be obtained visually from an email or web client while other information can only be obtained via the email header.&#x20;

[**Messageheader** ](https://toolbox.googleapps.com/apps/messageheader/analyzeheader)from the Google Admin Toolbox can assist with analyzing email headers by copy and pasting the entire email header and running the analysis tool. \
\
Similar tools include [Message Header Analyzer](https://mha.azurewebsites.net/) and [Mail Header](https://mailheader.org/).&#x20;

**Message Transfer Agent** ([MTA](https://csrc.nist.gov/glossary/term/mail_transfer_agent)) is software that transfers emails between sender and recipient.  Read about Mail User Agent (MUAs) [here](https://csrc.nist.gov/glossary/term/mail_user_agent).&#x20;

It is good to have multiple resources to refer to as each tool might reveal information that another tool may not reveal.&#x20;

Below are tools that can help analyze information about the sender's IP address:

* IPinfo.io: <https://ipinfo.io/>
* URLScan.io: <https://urlscan.io/>

Other tools that provide the same functionality and more: [URL2PNG](https://www.url2png.com/) and [Wannabrowser](https://www.wannabrowser.net/).

* Talos Reputation Center: <https://talosintelligence.com/reputation>

### <mark style="color:red;">Email Body Analysis</mark>

A malicious payload may be delivered to the recipient as a link or attachment in the email body. Links can be extracted manually from an HTML formatted email or by sifting through the raw email header. Online tools that can aid with this task are [URL Extractor](https://www.convertcsv.com/url-extractor.htm) and [CyberChef](https://gchq.github.io/CyberChef/).

**Tip**: Note the root domain for the extracted URLs to perform an analysis on the root domain as well.&#x20;

After extracting the URLs, next check the reputation of the URLs and root domain using any of the tools mentioned. If the email has an attachment, obtain the attachment safely.&#x20;

After obtaining the attachment, get its hash and check the file's reputation with the hash to see if it's a known malicious document. Helpful tools would be [Talos File Reputation](https://talosintelligence.com/talos_file_reputation) or [VirusTotal](https://www.virustotal.com/gui/). Another tool/company worth mentioning is [Reversing Labs](https://www.reversinglabs.com/), which also has a [file reputation service](https://register.reversinglabs.com/file_reputation).&#x20;

***How can you manually get the location of a hyperlink?***

Copy link location

### <mark style="color:red;">Malware Sandbox</mark>

Malware analysis skills are not needed as Defenders to dissect and reverse engineer malicious attachments as online tools and services (**malware sandboxes)** allow malicious file uploads for provided analysis to under the malware.&#x20;

Some online malware sandboxes:

* [Any.Run](https://app.any.run/)
* [Hybrid Analysis](https://www.hybrid-analysis.com/)
* [JoeSecurity ](https://www.joesecurity.org/)

### <mark style="color:red;">PhishTool</mark>

A tool that will help with automated phishing analysis is [PhishTool](https://www.phishtool.com/). PhishTool combines threat intelligence, OSINT, email metadata and battle tested auto-analysis pathways into one powerful phishing response platform. There is a free community edition available for download.

### <mark style="color:red;">Phishing Case 1</mark>

**Scenario**: As a Level 1 SOC Analyst, several suspicious emails have been forwarded  from other coworkers. Obtain details from each email to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.&#x20;

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FtKAWRibiLrNcwTjDGGvx%2Fimage.png?alt=media&#x26;token=1a35c9d4-1c91-4781-83d1-f9b746c336f6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2F4g6i36u0222Kds0f82r6%2Fimage.png?alt=media&#x26;token=747084a4-6c2d-459a-b41e-17eb57b7238c" alt=""><figcaption></figcaption></figure>

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2Fwok3f2R0KyriSErfDjbo%2Fimage.png?alt=media&#x26;token=012a9c31-db8b-4e56-b59d-62e57b43091f" alt=""><figcaption></figcaption></figure>

***What brand was this email tailored to impersonate?***

Netflix

***What is the From email address?***

<JGQ47wazXe1xYVBrkeDg-JOg7ODDQwWdR@JOg7ODDQwWdR-yVkCaBkTNp.gogolecloud.com>

***What is the originating IP? Defang the IP address.***

209\[.]85\[.]167\[.]226

***From what you can gather, what do you think will be a domain of interest? Defang the domain.***

etekno\[.]xyz

***What is the shortened URL? Defang the URL.***

hxxps\[://]t\[.]co/yuxfZm8KPg?amp=1

### <mark style="color:red;">Phishing Case 2</mark>

**Scenario**: As a Level 1 SOC Analyst, several suspicious emails have been forwarded  from other coworkers. Obtain details from each email to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.&#x20;

Link: <https://app.any.run/tasks/8bfd4c58-ec0d-4371-bfeb-52a334b69f59>

***What does AnyRun classify this email as?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FLvErGlusUlJgDFFHyxo2%2Fimage.png?alt=media&#x26;token=a343b6f1-732f-4ebf-875a-389818e3401d" alt=""><figcaption><p>suspicious activity</p></figcaption></figure>

***What is the name of the PDF file?***

Payment-updateid.pdf

***What is the SHA 256 hash for the PDF file?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FdQP3jrmFB7QGXFCaTE1D%2Fimage.png?alt=media&#x26;token=70a9534b-970e-4358-8253-0c5300d333e5" alt=""><figcaption><p>cc6f1a04b10bcb168aeec8d870b97bd7c20fc161e8310b5bce1af8ed420e2c24</p></figcaption></figure>

***What two IP addresses are classified as malicious? Defang the IP addresses. (answer: IP\_ADDR,IP\_ADDR)***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FQ6I29TAGmMIDEaR51TUI%2Fimage.png?alt=media&#x26;token=8fcdd656-3e2c-4f9d-8a93-60da34a3d5d4" alt=""><figcaption><p>2[.]16[.]107[.]24</p></figcaption></figure>

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FrJ9vSK46z9o9AjS6RHxk%2Fimage.png?alt=media&#x26;token=6e2fe68f-c528-4d33-8526-8f5674eef3fc" alt=""><figcaption><p>2[.]16[.]107[.]83</p></figcaption></figure>

***What Windows process was flagged as Potentially Bad Traffic?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2F7UERmVDs0ESJzPIM1UDG%2Fimage.png?alt=media&#x26;token=d1d97e38-9572-45f4-b35b-a8f8074e2d9f" alt=""><figcaption><p>svchost.exe</p></figcaption></figure>

### <mark style="color:red;">Phishing Case 3</mark>

**Scenario**: As a Level 1 SOC Analyst, several suspicious emails have been forwarded  from other coworkers. Obtain details from each email to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.&#x20;

Link: <https://app.any.run/tasks/82d8adc9-38a0-4f0e-a160-48a5e09a6e83>

***What is this analysis classified as?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FlpqQOsk44wpGnaeelANl%2Fimage.png?alt=media&#x26;token=1485cf54-f8f1-4c2f-97bb-be29fa7fbe7a" alt=""><figcaption><p>malicious activity</p></figcaption></figure>

***What is the name of the Excel file?***

CBJ200620039539.xlsx

***What is the SHA 256 hash for the file?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FWhWyPT26qEOmjKmwypza%2Fimage.png?alt=media&#x26;token=b7889784-fa57-43d1-b610-8113d4c9455c" alt=""><figcaption><p>5f94a66e0ce78d17afc2dd27fc17b44b3ffc13ac5f42d3ad6a5dcfb36715f3eb</p></figcaption></figure>

***What domains are listed as malicious? Defang the URLs & submit answers in alphabetical order. (answer: URL1,URL2,URL3)***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FvVRMCk0RlOME8VjnPlrT%2Fimage.png?alt=media&#x26;token=c3b93051-3aa5-4ba7-9096-05367fbfd25e" alt=""><figcaption><p>biz9holdings[.]com,findresults[.]site,ww38[.]findresults[.]site</p></figcaption></figure>

***What IP addresses are listed as malicious? Defang the IP addresses & submit answers from lowest to highest. (answer: IP1,IP2,IP3)***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2F2BIHXESVuLTiRPj2lV3t%2Fimage.png?alt=media&#x26;token=01eb01f8-1e00-4fe5-9f52-c8f7a859b797" alt=""><figcaption><p>103[.]224[.]182[.]251,75[.]2[.]11[.]242,204[.]11[.]56[.]48</p></figcaption></figure>

***What vulnerability does this malicious attachment attempt to exploit?***

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FIXDp6TettjDLtGw9lvAM%2Fimage.png?alt=media&#x26;token=a98fb02d-2b08-4dca-bf30-86c4f908778b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://309112325-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdUCUPJ7E8b7n8AB8j3ms%2Fuploads%2FgcBT31gEUnOF0vCznnkw%2Fimage.png?alt=media&#x26;token=3f5738e6-4b6c-468a-b5ed-d3142d6de17b" alt=""><figcaption><p>cve-2017-11882</p></figcaption></figure>

### <mark style="color:red;">Conclusion</mark>

Other tools not covered:

* <https://mxtoolbox.com/>
* <https://phishtank.com/?>
* <https://www.spamhaus.org/>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://jacob-taylor.gitbook.io/security-analyst/path-7/phishing/phishing-analysis-tools.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
