Write Up of PhishNet (HackTheBox Sherlock)
A short write up of the tasks presented in the PhishNet sherlock on HackTheBox.
Introduction
PhishNet is a ‘Very Easy’ difficulty sherlock on HackTheBox, focused with a category of SOC. The scenario goes as follows: an accounting team receives a malicious email that contains malware, and it is our duty to analyze the email to understand the attacker’s motives.
Inside of the file PhishNet.zip we see one singular file, which is email.eml
**Tools we will need: **
- Some sort of .eml viewer (Thunderbird was used)
- Sort text editor to see hidden contents of the .eml file (Kate was used)
Upon opening the file within Thunderbird we get a good view of what the phishing email looks like: 
Procedure
- What is the originating IP address of the sender?
- Which mail server relayed this email before reaching the victim?
- Mail server history of an email can be found within the section that contains blocks tagged with “Received:”
- They are sorted in chronological order of most to least recent, so we know that the top entry contains the email server that relayed this email before going to the victim.
- Since the answer asks us to identify the server via IPv4 address, we’ll search for the IPv4 address.

- This leaves us with
203.0.113.25
- What is the sender’s email address?
- What is the ‘Reply-To’ email address specified in the email?
- What is the SPF (Sender Policy Framework) result for this email?
- What is the domain used in the phishing URL inside the email?
- We can find this in two methods:
- Either way, we know that the domain is
secure.business-finance.com
- What is the fake company name used in the email?
- What is the name of the attachment included in the email?
- What is the SHA-256 hash of the attachment?
- We see the base64 payload of the file at the bottom below where it is listed.

- There’s two ways we can get the SHA256 from this base64 payload.
- If you are on Linux simply echo the payload into a base64 decode command, and then input the results of that into the
sha256sumcommand.echo UEsDBBQAAAAIABh/WloXPY4qcxITALvMGQAYAAAAaW52b2ljZV9kb2N1bWVudC5wZGYuYmF0zL3ZzuzIsR18LQN+h62DPujWX0e7 | base64 -d | sha256sum
- If you are not on Linux, you can use CyberChef by copying the base64 payload, decrypting it by using ‘From Base64’ and then putting it to SHA256 by using ‘SHA2’ and setting the size to 256.
- If you are on Linux simply echo the payload into a base64 decode command, and then input the results of that into the
- Answer:
8379c41239e9af845b2ab6c27a7509ae8804d7d73e455c800a551b22ba25bb4a
- What is the filename of the malicious file contained within the ZIP attachment?
- What MITRE ATT&CK techniques are associated with this attack?
- To isolate the specific technique in place, we can trace-back two things that we know about this attack:
- It is a phish posing as another organization
- Contains a zip file with a batch script inside
- With these two pieces of knowledge we can specify it down to it being a Phishing technique, with a sub-technique of using an attachment
- Looking on the MITRE ATT&CK Framework, we can see there is a listing for something that matches what we are searching for.

- This gives us the attack ID of
T1566.001
- To isolate the specific technique in place, we can trace-back two things that we know about this attack:
Conclusion
This Sherlock on HackTheBox gives a great introduction to Phishing analysis. I’d strongly recommend it for anyone wanting a small challenge, while also wanting to gain more knowledge of how to investigate Phishing attacks. Over the course of doing this challenge we learned how to analyze the contents of a .eml file, how to gain more knowledge of attached files in a .eml and finally how we can correlate this to the MITRE ATT&CK Framework.











