LetsDefend: Phishing Email Analysis

LetsDefend: Phishing Analysis

Scenario: Suspicious Email reported. Artifact: .eml file.

1. Header Analysis

Return-Path: <attacker@evil.com> (Matches Sender? No, spoofed). Received-SPF: SoftFail (IP does not match domain). X-Mailer: PHP Mailer (Automated script, not Outlook).

2. Body Analysis

"URGENT: INVOICE OVERDUE". Link: http://paypal-verify.com (Typosquat). Hovers over: bit.ly/xyz (Hidden redirect).

3. Attachment

Invoice.html. It contains Javascript that redirects the browser to a credential harvester.

Verdict

Malicious. Block sender, purge from environment.