🎣 Static Email Analysis During a Reported Phishing Attempt

Ashish GhimireAshish Ghimire
3 min read

A phishing email was reported by a student through the university’s phishing reporting channel. The email appeared to impersonate university IT and prompted the user to "verify account credentials." I conducted a static email analysis to evaluate the threat without triggering any content or executing any code.

Below is a breakdown of the analysis process and the tools used to investigate the email safely and effectively.


📨 Header Analysis

The first step was to extract and review the email headers to validate the sender’s legitimacy.

Key observations:

  • From address: it-support@lsus-helpdesk[.]org

  • Return-Path mismatch with From

  • SPF passed

  • DKIM and DMARC both failed

  • The domain lsus-helpdesk[.]org was not owned by the university

📌 Tools used:

  • MxToolbox Header Analyzer

  • Message Header Analyzer add-in for Outlook


đź”— URL Extraction and Analysis

The email contained a single embedded link labeled “Verify My Account” pointing to:

arduinoCopyEdithttps://login-lsus365[.]webredirectauth[.]xyz

I extracted the link without clicking and submitted it to the following tools:

âś… Results:

ToolResult
VirusTotalDetected by 6 engines as phishing
URLScan.ioRendered a fake Microsoft 365 login page
CheckPhish.aiLabeled as phishing, flagged visual similarity to Microsoft
WHOISDomain registered 48 hours ago, privacy-protected
AbuseIPDBNo current abuse reports, but flagged for future monitoring

đź§Ş HTML Body Review (Static)

Using CyberChef, I decoded the HTML portion of the email. Findings included:

  • An invisible iframe loading the phishing site

  • Base64-encoded redirect script

  • Email was formatted to look identical to a Microsoft 365 notification

📌 Tools used:

  • CyberChef

  • Manual HTML inspection


đź“‚ Attachment Review (If Present)

In this case, no attachment was present. If there had been .doc, .pdf, or .html files, I would have used:

  • oletools / oleid – macro analysis

  • pdfid.py – static PDF analysis

  • strings / exiftool – file metadata review


đź§ľ Summary of Indicators of Compromise (IOCs)

TypeValue
Malicious URLhttps://login-lsus365[.]webredirectauth[.]xyz
Domainwebredirectauth[.]xyz
Senderit-support@lsus-helpdesk[.]org
DKIM / DMARCFailed
iframe SrcHidden redirect to phishing page

đź”’ Remediation Steps Taken


đź§° Tools Used

ToolPurpose
MxToolboxHeader analysis
VirusTotalURL reputation
URLScan.ioWeb rendering and behavior
CheckPhish.aiPhishing detection
CyberChefDecoding and static inspection
WHOIS lookupDomain age and ownership
AbuseIPDBIP/domain reputation monitoring

âś… Conclusion

The phishing email used visual impersonation, newly registered domains, and evaded basic filters by passing SPF. Static analysis alone was sufficient to confirm its malicious intent and allowed us to block the threat without needing dynamic interaction or sandbox detonation.

This case reinforces the value of proper reporting channels and fast static triage using open-source, reliable tools.

đź’¬ Final Thoughts

This incident was a great reminder that end-user awareness matters—this campaign bypassed email security filters, but a vigilant student triggered our defense. As SOC analysts, we don’t always need heavy automation or dynamic sandboxes to catch a phish.

Sometimes, a bit of static analysis and good intuition is all it takes avoid interacting with the content directly. Always extract URLs and analyze them in safe, sandboxed environment is all it takes.

đź§  Pro Tip: When analyzing suspicious emails,ments like URLScan.io and VirusTotal.

4
Subscribe to my newsletter

Read articles from Ashish Ghimire directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ashish Ghimire
Ashish Ghimire

Cybersecurity professional with a strong foundation in network security, GRC, system administration, SOC analyst, and threat hunting. Experienced in real-time threat detection, incident response, and security monitoring using tools such as Splunk, CrowdStrike Falcon, and Microsoft Entra ID. Skilled at securing enterprise environments and aligning security practices with compliance frameworks. Currently deepening expertise in penetration testing, red teaming, cloud security, malware analysis, and reverse engineering, with a strong commitment to continuous learning and operational excellence in cybersecurity.