How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup

An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to specific targets.

These attacks may use social engineering techniques to manipulate victims into revealing sensitive information and installing malware.

Cybersecurity researchers at ANY.RUN recently unveiled a proper guide to analyzing an advanced phishing attack with Threat Intelligence Lookup.

ANY.RUN Threat Intelligence Lookup provides contextual search online and via API. We index and analyze data from millions of public interactive analytical sessions, or “tasks,” that our community of over 300,000 academics and 300 organizations performs in the ANY.RUN sandbox.

Technical Analysis

Multitudes of opportunities can be unlocked with the help of this new tool that helps maximize threat intelligence. The search capabilities of this new tool enhance the search abilities and provide precise security incident responses.

The online Threat Intel Lookup service of ANY.RUN with API access scans millions of community tasks which links the isolated indicators to specific threats for your security team.

Search results

Even with the help of Threat Intel Lookup, you can also check the new IP in logs. Besides this, it also enables us to find sandbox matches fast, often naming malware families and providing related data like ports, URLs, and hashes.

Document
ANY.RUN Threat Intelligence Lookup

Try ANY.RUN Yourself with a 14-day Free Trial

Threat Intelligence Lookup centralized repository of millions of IOCs extracted from ANY.RUN’s extensive database of interactive malware analysis sessions. ANY.RUN Threat Intelligence: Search for linked IOCs using over 30 fields .

How to Explain a Strange Command Line

In an event, the employee alerted security of a phishing attempt, which opened a suspicious Office attachment that enabled Macros, which triggered the alarm.

While examining the IDR logs, cybersecurity analysts discovered the highlighted PowerShell process with $codigo. Analysts without Threat Intelligence Lookup might search online, wasting time.

Searching ‘ImagePath:powershell’ AND ‘CommandLine:$codigo’ reveals multiple $codigo-related command lines. The events tab shows ‘stegocampaign’ tags that suggest a possible cyberattack.

Moreover, cybersecurity researchers affirmed that they are progressing aggressively, but they still need more refinement to their search.

IDR logs hint at a suspicious connection on port 2404, which is uncommon in their network.

The updated search reveals fewer tasks which is mostly tied to Remcos malware, a notorious Remote Access Trojan often utilizing PowerShell. 

Finding the Family of Malware

Researchers are making progress, but they still need to fine-tune their search. Based on the information from the IDR logs, it appears that a machine that is potentially infected is connected to port 2404. This port is not commonly used in our network infrastructure.

Threat Intelligence Lookup uncovers malicious IPs linked to the tasks that aid in further investigating malware behavior.

Confirm Remcos’ presence by merging the network rule name with the IP (RuleName: remcos AND DestinationIp: 107.172.31.178). While the ANY.RUN’s Threat Intelligence Lookup entrusts cybersecurity analysts,. 

Utilizing IP Address for Investigating Remcos

 Write a query combining a network rule name with the IP address associated with port 2404. In addition, researchers narrow down the search to display tasks from the past week. This is how it will appear: Rule name: “remcos” and destination IP: “107.172.31.178”

The example above shows one way that ANY.RUN’s Threat Intelligence Lookup can be very useful for cybersecurity experts.

Currently, it’s offering a trial with 20 search queries for existing Searcher plans or above clients. However, you can reach ANY.RUN for customer plans and subscriptions.

Cyber Writes

Work done by a Team Of Security Experts from Cyber Writes (www.cyberwrites.com) - World’s First Dedicated Content-as-a-Service (CaaS) Platform for Cybersecurity. For Exclusive Cyber Security Contents, Reach at: business@cyberwrites.com

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

18 hours ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

3 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

3 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago