[Storm-1575] ThunderDash Email Analysis


VirusTotal Collection:

 https://www.virustotal.com/gui/collection/873848a6a028db6451b8f887796134919e4f981c16c68c23ee72c95836040ce4/iocs


1. Overview
The malware sample was initially analyzed by a third party via Any.Run with no immediate threats detected. However, a deeper dive revealed multiple phishing redirections targeting Microsoft O365 credentials.



2. IOCs and Hash Analysis

  • Attachment Hash:
    f6d618128d0850704da57558c80a0a0602ef369aacda7ce65f2b580c84d8d311

  • Email Hash:
    fe2131b728d87262b96e42fd0f52900e5efb83fc2babe9a50700


3. Email Header Findings

  • DMARC: Not Implemented
  • SPF: Passed Verification


4. Phishing Attack Vector

  • Initial QR Code URL:
    https://epyfl.org/ad_hits.asp?idBanner=17&txtLink=https://auth-endpoint-gfh7ape8h5auesae.westus-01.azurewebsites.net/index.php/auth/v/?id=abc123XYZ4567890/message?data=/login.aspx

  • Redirection Path:

    • Leads to Cloudflare bot check and finally to a fake O365 login page hosted at:
      https://three03828922939389248u2u22.onrender.com/gov-ni-nda/3039923002302393898944.html#X

5. Script Analysis

  • Embedded obfuscated Base64 script decoded via CyberChef:




    Revealed credentials harvesting URL by modifying script to output decrypted URL to console:
    https://blackmooncoo.ru//




6. Threat Attribution

  • Any.Run Analysis: Identified as [Storm-1575] ThunderDash.

Additional Resources:
For full IOC details, refer to the VirusTotal Collection.



Comments