Skip to content

E1DIGITALPF/malware-email-forensics

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 

Repository files navigation

Malware Email Forensics & Analysis

This repository contains a comprehensive forensic analysis of a sophisticated phishing campaign targeting Windows users via a deceptive "Formal Compliance Notice".

πŸ” Overview

The analysis focuses on a targeted email attack that employs advanced social engineering, homograph obfuscation, and fileless malware delivery techniques. The goal of the attack is to deceive victims into executing a malicious PowerShell payload under the guise of an "Enhanced Protection" update.

πŸ“ Repository Structure

  • malware_email_forensic_report.md: The primary forensic report detailing incident timeline, technical payload breakdown, header analysis, and risk assessment.

πŸ›  Key Technical Findings

  1. Fileless Malware Execution: Analysis of a PowerShell "Living off the Land" (LotL) attack that downloads and executes code directly in memory.
  2. Evasion Techniques:
    • Homoglyphs: Use of Cyrillic characters in the subject and body to bypass spam filters.
    • Bayesian Poisoning: Randomized hidden HTML comments to confuse statistical analysis engines.
  3. Authentication Bypass: Documentation of how the attack leveraged legitimate Microsoft infrastructure (outlook.com) to pass SPF, DKIM, and DMARC checks.

⚠️ Disclaimer

The scripts and commands analyzed in this repository are for educational and forensic purposes only. Do not execute any code provided in the analysis on production systems.

πŸ‘€ Analyst

E1DIGITAL Forensic Analysis & Incident Response

About

This repository contains a comprehensive forensic analysis of a sophisticated phishing campaign targeting Windows users via a deceptive "Formal Compliance Notice".

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors