2024-08-29 (THURSDAY): PHISHING EMAIL AND TRAFFIC TO FAKE WEBMAIL LOGIN PAGE

NOTES:

ASSOCIATED FILES:

 

EMAIL

HEADER LINE INFORMATION FROM THE EMAIL:

  • Received: from s940027.srvape[.]com (s940027.srvape[.]com [188.127.247[.]252])
       
    [information removed]; Thu, 29 Aug 2024 04:15:53 +0000 (UTC)
  • Received: from ip172.ip-149-56-149[.]net (localhost [IPv6:::1])
        by s940027.srvape
    [.]com (Postfix) with ESMTP id 617B56EE2A2
        for <admin@malware-traffic-analysis
    [.]net>; Wed, 28 Aug 2024 12:06:27 +0200 (CEST)
  • From: SupportDesk <khz.port@scp[.]gov[.]iq>
  • Account Validation!! For admin@malware-traffic-analysis[.]net Only!!
  • Date: 28 Aug 2024 03:06:26 -0700
  • Message-ID: <20240828030626.DFAECAD6A3F54472@scp[.]gov[.]iq>

 

TRAFFIC

URL FROM THE EMAIL:

  • hxxps[:]//email.procedure[.]best/management.aspx?good=admin@malware-traffic-analysis[.]net

 

IMAGES


Shown above:  Screenshot of the email.

 


Shown above:  Viewing the website in Microsoft Edge using HTTP instead of HTTPS for the URL.

 


Shown above:  Filtered in Wireshark, traffic from visiting the fake webmail page using HTTP instead of HTTPS for the URL.

 


Shown above:  TCP stream of the HTTP POST request sending my login credentials.

 

Click here to return to the main page.