PhishNet
Sherlock Scenario
An accounting team receives an urgent payment request from a known vendor. The email appears legitimate but contains a suspicious link and a .zip attachment hiding malware. Your task is to analyze the email headers, and uncover the attacker’s scheme.
We can analyze emails using many automated tools, but I prefer to practice the manual way when solving this Sherlock.
Summary Workflow:
Open safely → Check headers → Inspect body/links → Analyze attachments → Threat intel enrichment → Map to MITRE → Document & report.
Question
What is the originating IP address of the sender?
Solution
X-Originating-IP
records the sender’s real client IP and is the most reliable indicator of the true source. X-Sender-IP
is non-standard, may be added by mail servers, and often matches X-Originating-IP but can also show an intermediate server’s IP.
Ans
45.67.89.10
Question
Which mail server relayed this email before reaching the victim?
Solution
Email headers add Received
lines in reverse order. The top-most Received
line shows the last server that handed the mail to the victim. Here it is: “Received: from mail.business-finance.com ([203.0.113.25])”
Ans
203.0.113.25
Question
What is the sender’s email address?
Solution
The header clearly shows the Form:
field as: “From: “Finance Dept” finance@business-finance.com” So the sender’s email address is finance@business-finance.com.
Ans
finance@business-finance.com
Question
What is the ‘Reply-To’ email address specified in the email?
Solution
We can extract this from the request header information.
Ans
support@business-finance.com
Question
What is the SPF (Sender Policy Framework) result for this email?
Solution
We can extract this from the request header information. As we can see the value of this tag is pass
.
Ans
Pass
Question
What is the domain used in the phishing URL inside the email?
Solution
We extracted all the URLs from the file and only one URL appear.
grep -Eo 'https?://[^ >"]+' email.eml || echo "no http/https URL found"
Ans
secure.business-finance.com
Question
What is the fake company name used in the email?
Solution
From the email body we got the company name.
Ans
Business Finance Ltd.
Question
What is the name of the attachment included in the email?
Solution
There are multiple ways to extract the attachment from email. In this case i found ripmime
tools useful. We ectracted the attachments inside a folder called “extracted”.
ripmime -i email.eml -d extracted
Ans
Invoice_2025_Payment.zip
Question
What is the SHA-256 hash of the attachment?
Solution
We can generate a file hash using different methods in this case i used sha256sum
binay to generate the hash information.
Ans
8379C41239E9AF845B2AB6C27A7509AE8804D7D73E455C800A551B22BA25BB4A
Question
What is the filename of the malicious file contained within the ZIP attachment?
Solution
While unziping the file it was giivng error with all kind of tools. in 7z
tool there is a option forecfully list included items in a zip file.
Ans
invoice_document.pdf.bat
Question
Which MITRE ATT&CK techniques are associated with this attack?
Solution
Visit the MITRE ATT&CK technique inside the phishing there will be all four sub-techniques available and its a Spearphishing service attack.
Ans
T1566.001
Leave a comment