security portfolio + blog

by Nicholas Coleman

Download as .zip Download as .tar.gz View on GitHub
26 March 2025

Phishing Investigation

by Nicholas Coleman

pv1

I had received an alert on my SIEM tool, which prompted me to investigate.

Scans:

pv2

pv3

MD5 Hash: 0cbede8a169ecbbabd533aa9202d9015 SHA-256: 38b01a12b8dcd39ebdcf9e97772e848237330eb227e1ccee80125564b27377e5

pv4

One of the bundled files was flagged as suspicious by VirusTotal. Looking more into it, it seems like BitDefender and a couple of other big-name AVs are flagging this. The bundled file name is 11f44531fb088d31307d87b01e8eabff.zip. Its MD5 is 9458859abfd384f38362af01fb306f14.

This could be something. Looking more into the bundled file, it seems like it is in contact with two IP addresses: 188.209.214.83 and 204.79.197.203. These are the C2 servers.

pv5

Delving deeper, I can see all sorts of nasty behavior coming from this bundle file. I have all but confirmed the maliciousness of this attachment.

Looking at the Device Action tab in my SIEM, I can see that the email was allowed by the receiving user’s mail service. I moved to proactively delete the email before the user could potentially interact with the malicious file.

It looks like, from looking at logs, that the user did not click/download the attachment. I could not find any evidence of communication to these C2 servers by the user’s system.

The bundled file contains a Trojan virus that interacts with the IP address: 188.209.214.83 which is tied to the domain: nws.visionconsulting.ro

The bundled Trojan drops multiple suspicious files, as well as starting processes on the victim machine. The use of temporary directories to store unusual DLL files is a clear indication of malicious activity. Furthermore, the use of regsvr32.exe with those DLL files suggests a potential attempt to register a malicious or unknown DLL.

tags: letsdefend