Analyzing Phishing attacks that use malicious PDFs
PDF malicious

Analyzing Phishing attacks that use malicious PDFs

Portuguese version

Every day everybody receives many phishing attacks with malicious docs or PDFs. I decided to take a look at one of these files. I did a static analysis and I went straight to the point to make this reading simple and fast.

Here is the received email?as it was from the Caixa Economica Federal bank, but we can see the sender uses Gmail services and a strange name.

No alt text provided for this image

I verified this e-mail header using MXtoolbox, and we can see the IP used by the sender (attacker).

No alt text provided for this image

Below is the reputation of the IP used by the attacker.

No alt text provided for this image

We can see this IP has a lot of mentions about malicious activities.

No alt text provided for this image

I downloaded this file in my VPS (Kali Linux) and used peepdf to do an analysis of the file structure, and I found 2 URIs in objects 3 and 5.

No alt text provided for this image

After I checked objects 3 and 5 using pdf-parser, I discovered a malicious URL in the 3.

No alt text provided for this image

I did a check about this URL in VirusTotal and it had a malicious reputation.

No alt text provided for this image

When I opened the file in the Kali, we could see it had an original logo of the bank and a button to click that will direct me to an URL.

No alt text provided for this image

When I clicked in this button the URL hxxp://cefonlineencaminha[.]z13[.[]web[.]core[.]windows[.]net redirect to another URL ms[.]meuappavisos[.]com

No alt text provided for this image

I checked the URL reputation and it has a lot of mentions about it.

No alt text provided for this image

In conclusion, it's essential to take care and attention to each detail when you open this kind of email because you can put your machine in a dangerous situation, have your data exfiltrated, be hacked and etc.

Tools used during the analysis:?

Charles Rodrigues

DevOps Engineer - Kubernetes and Linux Certified

3 年

Parabéns Zoziel! Excelente artigo

Ahmet Abdagic

Senior System Administrator

3 年

Nice article Zoziel F..

Anderson Gomes

Technical Account Manager at Fortinet

3 年

Excelente artigo meu amigo.

Fernando Quinino

Cloud Professional certified in Terraform, Kubernetes, VMware, and AWS.

3 年

Excelente artigo. parabéns pela dedica??o do seu tempo em compartilhar esse conteúdo de altíssima qualidade.

Nelson Silva

Cyber Security Analyst | CompTIA CySA+ | Security+ | Exin Ethical Hacking | LPI-E | ISO27001 | SC-900 | AZ-900 | ITIL | Exin Cloud C | ISO20000 | RSA Netwitness | QRADAR

3 年

Nossa parabéns Zoziel, excelente iniciativa! Documenta??o bem clara e objetiva. ??

要查看或添加评论,请登录

Zoziel P.的更多文章

  • From the Zero to Malware Discovery

    From the Zero to Malware Discovery

    Hello people, I was with some time, and I decided to made an analysis using some tools that I commented last post…

    29 条评论
  • Windows Analysis Tips and Tools

    Windows Analysis Tips and Tools

    Hi people, I found some old notes, but useful that I use during an incident, and I decided to share these tools and…

    14 条评论
  • Ransomware is not just a threat, it's a crisis waiting to happen...

    Ransomware is not just a threat, it's a crisis waiting to happen...

    Although I haven't posted anything here, I wanted to share my thoughts on my favorite wicked malware: ransomware. To…

    21 条评论
  • Analyzing Steal Bank Account with Malicious PDF

    Analyzing Steal Bank Account with Malicious PDF

    Hi everyone, as have time I don't post anything, I decided to write one more analysis about stolen bank accounts and…

    11 条评论
  • Analise de arquivos maliciosos - Exemplo 01

    Analise de arquivos maliciosos - Exemplo 01

    English Version O intuito dessa série de artigos é exibir analises de exemplos de arquivos maliciosos que apresentei…

    13 条评论
  • Malicious file analysis - Example 01

    Malicious file analysis - Example 01

    My objective with this series of articles is to show an analysis of examples of malicious files that I presented during…

    3 条评论
  • Analisando ataques de phishing que usam PDFs maliciosos

    Analisando ataques de phishing que usam PDFs maliciosos

    Todos os dias nós recebemos muitos ataques de phishing com documentos(Word, Excel) ou PDFs maliciosos. Resolvi dar uma…

    11 条评论
  • PowerShell Introduction

    PowerShell Introduction

    I wrote this article to show a brief introduction about how to use PowerShell daily. Many professionals work…

    9 条评论
  • Carreira em Cybersecurity

    Carreira em Cybersecurity

    English Version Fala galera sempre escrevo artigos, compartilho posts de alguns sites que acompanho e acho relevante…

    10 条评论
  • Cybersecurity career

    Cybersecurity career

    Hey guys, I always write articles, share posts from some sites that I follow and find relevant. Among these various…

    4 条评论

社区洞察

其他会员也浏览了