Malware Analysis Spotlight: Phishing Site Spread through SMS
In this Malware Analysis Spotlight, the VMRay Labs looks at the behavior of a phishing site distributed through an SMS message. Based on the content of the SMS message, this does not seem to be part of a targeted attack but rather part of a massive phishing campaign that aims at users of Apple products. This analysis will show how the threat actor used a fake Apple website to trick victims into entering login credentials, banking information and a photo of a driver’s license/passport.
VMRay’s Automatic Web Analyzer detects the delivered URL as malicious and classifies it as a phishing attempt (Figure 2).
Looking at the VMRay Threat Identifiers (VTIs) in Figure 3, there are several heuristic matches that characterize this as a phishing site:
- Use of the Apple favicon
- Use of HTTP versus HTTPS for entering sensitive information (e.g. login details)
- The page presenting itself as a login page for Apple ID
The combination of these matches, we can see how the threat actor tries to masquerade the site as an official Apple website (Figure 4.).
For a closer look, we analyzed the phishing site with VMRay Analyzer’s Interactive Web Engine.
After clicking on the unlock account link, we are directed to a page that displays multiple forms asking for the user’s Apple ID credentials (Figure 5), credit card information (Figure 6) and a copy of a passport/driver license (Figure 7).
In addition to the sequential interaction, the IOC tab (Figure 9) shows a filtered view of the 119 artifacts extracted during analysis. There were 2 URLs classified as IOCs based on the VTI rules.
With the information presented in the IOCs and Behavior tabs Security Teams have the ability to block further phishing attempts using this domain and understand how the user’s information is being sent back to the threat actor by analyzing the extracted resources.