Skip to content

Wisdomajoku/Malicious-Email-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

Malicious Email Analysis Project

Project Overview

The objective of this project is to simulate and analyze a malicious email containing a phishing link with a reverse shell payload created using Msfvenom.

Methodology

  1. Payload Generation: The payload was generated using Msfvenom.
  2. Payload Generation Screenshot Payload Generation Screenshot2
  3. Email Creation: A malicious email was created with a phishing link containing a reverse shell payload.
  4. Email Creation Screenshot
  5. VirusTotal and Hybrid Analysis: The email and payload were analyzed using VirusTotal and Hybrid Analysis, which showed high alert ratings for malicious activity.
  6. VirusTotal
  7. VirusTotal Analysis Screenshot Hybrid Analysis Screenshot

Technical Details

  1. Payload Details:
    • Type: Reverse shell
    • Size: 73802 bytes
    • Notable Characteristics: [insert any notable characteristics]
  2. Attachments: None
  3. Links=Yes

Tools

  • Kali Linux
  • Meterpreter
  • Virus Total
  • Hybrid-Analysis

  • Analysis Results

    VirusTotal and Hybrid Analysis reported high alert ratings for malicious activity, indicating that the email and payload are likely malicious. Some red flags include:

  • Urgency: The email creates a sense of urgency by stating that the patch is mandatory and failure to install it may result in account compromises or suspensions.
  • The email lacks specific detail about the vulnerabiity.
  • Suspicious link: The email asks you to click a link to download and install a patch, which could be malicious.
  • Unofficial update: The email mentions a "temporary patch" and an "official update," which may indicate that the email is not from an official source
  • Lack of verification: The email does not provide any verification or authentication details to confirm its legitimacy.

  • Recommendations

    To prevent similar malicious emails from reaching users' inboxes, the following specific security measures are recommended:

    1. Implement a robust spam filtering solution that utilizes machine learning algorithms to detect and block phishing emails.
    2. Configure email clients to display warning messages for emails with suspicious links or attachments.
    3. Enable two-factor authentication (2FA) for all email accounts to prevent unauthorized access.
    4. Conduct regular security awareness training for employees to educate them on identifying and reporting suspicious emails.
    5. Utilize the company's sandbox solution to analyze suspicious links and attachments in a safe and controlled environment.
    6. Check official channels: Look for official announcements or updates on the company's website or official communication channel or reach out to departments.
    7. If an employee suspects a link or attachment is malicious, they should:
      • Avoid clicking on the link or opening the attachment directly.
      • Submit the link or attachment to the sandbox solution for analysis.
      • Wait for the sandbox solution to provide a report on the link or attachment's safety before taking further action.

    Conclusion

    The simulated malicious email and payload were successfully analyzed, and the results confirmed the presence of malicious activity. This project demonstrates the importance of email security and the need for vigilance when dealing with suspicious emails.

    About

    Simulation and analysis of phishing emails — headers, payloads, and attacker techniques.

    Topics

    Resources

    Stars

    Watchers

    Forks

    Releases

    No releases published

    Packages

     
     
     

    Contributors