Phishing Analysis Lab 2

Scenario

You have been sent a phishing link – It is your task to investigate this website and find out everything you can about the site, the actor responsible, and perform threat intelligence work on the operator(s) of the phishing site.

Warning: The website and kit you see is the lab is REAL. Exercise caution when interacting with the malicious website and do not enter any sensitive information

Tools: Text Editor , Browser , Terminal, Mitre ID: T1566

1. What is the sending email address for the phishing log results?

From the desktop, we can view the instructions.

The link led to this paypal clone website

After examining the /var/www/html directory, we discovered the phishing kit. Following several minutes of thorough enumeration, we identified the attacker’s email address.

2. Name one user agent which is blocked from accessing this phishing kit by the custom blocker php code? 

We reviewed the .htaccess file and found that it contained six blocked user agents.

3. The phishing kit has been accessed once it was live at 17:42 on the 19th of February. What is the city name were the threat actor lives?  – City Name

We looked in the log file and found an IP address.

Using an IP geolocation tool such as IP2Location, we retrieved the city name associated with the IP address.

4.Bruce has tested the phishing site using an email address with the domain @hammer.org. What password did he enter? (8 points) – Test Password Inputted

We used the grep command on the domain hammer.org and found a file named BananaZumba-10.0.2.15.html where the keyword is located.

Looking in the file, we found the password:

5. A user using a 192.* local host range has tested the site. What password did they enter?  – Test Password Inputted

In the same folder as the previously mentioned file, we found another file named BananaZumba-test@xBananaV3.com–192.168.1.10.html.

We read the file and found the entered password:

6.A user has submitted their credentials into the site. They were using the IP address 14.154.211.11 and the email R0xy@bettleJuice.com. What is their full name?

We opened and read the file BananaZumba-R0xy@bettleJuice.com–14.154.211.11.html for further analysis.

7. What is their 3D Secure password? – 3D Secure Password

From the same previous file, we scrolled and found also the 3D Secure Password:

8.What city is their IP associated with? (7 points) – City Name

Continuing, we found a geolocalisation URL:

9.What is the password for the hidden admin panel? 

After performing enumeration, we discovered the password stored in the user-old.php files located in various folders.

From the xBanana folder, we can read the password in clear text in the password configuration section:

10. There appears to be a hidden zip within the phishing kit. Find it, extract it using the ‘Key’, and deobfuscate the code. Who is the email.php code “signed by”? 

We found a zip file in web root directory:

We copied the ZIP file to the Desktop and extracted its contents. Inside the extracted directory, we found a logo.png file. Upon copying and unzipping logo.png, we were surprised to discover that it contained two PHP files.

Reading both files, we saw encoded strings which first looked like base64:

We opened CyberChef and pasted the contents of index.php. Using the FromBase64 recipe followed by Magic in Intensive Mode, we noticed that the second decoding step involved an XOR operation.

We selected the proposed XOR recipe and got new output we put in text editor:

For the email.php, we decoded many times from base64 to get the answer:

We looked in the decoded email.php and found the anwer: ABILITY

11. Who is the recipient of the credential logs? 

From decoded email.php, we also got the recipient: banklogs1@gmail.com

12. What domain is the user redirect to upon a POST request to the email.php page? 

Still from the decoded email.php, we got the domain at the bottom: att.net

13. Within index.php a cookie is set. What is the value of the cookie?

We search the cookie value in the decoded index.php and found it:

Leave a Comment

Your email address will not be published. Required fields are marked *