Blue Hexagon Blog

Deep Learning Threat Detection Reveals Details Behind Targeted Phishing Campaigns – Part Two

Blue Hexagon Threat Lab Detects Two Phishing Sites, Including One In Development

Looking closer at the phishing campaign we discovered using the Blue Hexagon Real Time Deep Learning platform, powered by our HexNet architecture, Blue Hexagon Threat Labs identified a host of indicators of compromise that we have included in part two of this blog. 

In an attack on a health insurance company, we learned that a single threat actor, operating behind five distinct identities, was behind the phishing campaign. Each of the five identities involved was created to mimic a company involved in a legitimate business with the target organization. These included:

  • A pharmaceutical company based in Hong Kong (Fig 1);
  • A German pharmaceutical company (Fig 2);
  • Two Italian hospitality companies (Figs 3 and 4); and,
  • A property management company based in Hong Kong (Fig 5).

Figure 1: Chinese Pharmaceutical Company
Figure 2: German Pharmaceutical Company
Figure 3: Italian Hospitality Company 
Figure 4: Italian Hospitality Company
Figure 5: Chinese Hospitality Company

Phishing Email Analysis

Emails with subject lines typical of a phishing campaign and appearing to originate from the Chinese pharmaceutical company CSPC Pharmaceutical Group Limited (Fig 6 and 7) were sent from the address Our investigation found that no employee named “Khalid” works for the company. Furthermore, emails sent to that address bounced back (Fig 8), confirming this address as a fake created by the threat actor. 

Figure 6: Phishing email with malicious archive attachment

Figure 7: Phishing email with a malicious document

Figure 8: “”is a fake email address abused by the threat actor

We found that the email address originated from the IP address, geolocated in New York, and belongs to Ubiquity Hosting, a web hosting subsidiary of LeaseWeb USA, one of the world’s largest web hosting brands. 

Killchain Analysis 

In each case, the attack vector was a document carrying an exploit that allowed the threat actor to execute code on the victim’s system. Once the victim clicked on the attachment, the following steps in the killchain unfolded, leading to infection:

1. Download AgentTesla, HawkEye Information Stealer Malware:

  • The Victim’s system downloads different windows executables hosted on the domain (Fig 9).

Figure 9: Website for the domain

At the time of this writing, the domain had resolved to the IP address, which is an Amazon IP address. The threat actor capitalized on the reputation of Amazon Web Services (AWS) to host their website as they were aware that cybersecurity companies would not blacklist an AWS IP address and so they were able to abuse the reputation.

However, .KR is the country code top-level domain (ccTLD) for the Republic of South Korea, and the WHOIS information (Figs 10 and 11) for the domain shows that it was hosted on a South Korean web hosting provider ( and that it was registered by Joseph Mullich, whose email address is and whose cell number is identified as 1588-5829. The local address, 경기도 성남시 분당구 성남대로925번길 37 한승베네피아 2층,” translates in English as “2F, 37, Seongnam-daero 925 Beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do, Seoul, KR.”

Figure 10: WHOIS Information for in the Korean Language

Figure 11: WHOIS Information for in the English Language

The email address actually belongs to Joe Mullich (Linkedin:, an award-winning writer whose work has been published in top business magazines like Forbes, Wall Street Journal, and Harvard Business Review, and for business institutions like HSBC Bank, Morgan Stanley, Ogilvy, Habitat For Humanity, Symantec, Ford Motor Company, FedEx, Cathay Pacific, Children’s Hospital of Los Angeles, Bombardier, and BBDO. 

Blue Hexagon Labs notified Joe Mullich about the registration of malicious domains under his name. We are investigating why his identity was abused by the threat actor. 

2. Execute Agent Tesla, Hawk Eye to Steal Sensitive Information from Victim’s Local Software: Both AgentTesla and HawkEye can be categorized as information stealers as they are capable of stealing sensitive information including, but not limited to, the following categories of software:

  • Web Browsers: Google Chrome, Mozilla Firefox, Opera, Chromium, Chrome Plus by Maple Studio, Yandex, Orbitum
  • Email Clients: Mozilla Thunderbird, Microsoft Outlook, Aerofox Foxmail, IncrediMail, Qualcomm Eudora
  • FTP Clients: WinSCP, SmartFTP, Filezilla, WS_FTP by IPSwitch, CoreFTP by FTPWare
  • Internet Download Manager

Upon execution, both AgentTesla and HawkEye exfiltrate the stolen information to an attacker-controlled SMTP server. 

3. Exfiltrate Stolen Data to an Attacker-Controlled SMTP Servers:

The exfiltrated data was sent via encrypted SMTP messages to,, on SMTP Port 587, over TLS.

  • Exfiltrated the stolen data to,, (Fig 12) which are SMTP mail servers controlled by the threat actor.
  • The domain is a web-based private email hosting service, provided by NameCheap (Fig 13).
  • The domain is a web-based private email hosting service, provided by Endurance (Fig 14).
  • The domain (Fig 15) is a web-based private email hosting service, provided by Webhostbox (Figs 16 and 17).

Figure 12: Parent website for the SMTP Server (Saudi Arabia)

Figure 13: Email hosting provider for the SMTP Server

Figure 14: Web hosting provider for the SMTP Server

Figure 15: Parent website for the SMTP Server

Figure 16: Email hosting provider for the SMTP Server

Figure 17: Email hosting provider for the SMTP Server

Although contact information for (Fig 18) states that the company is based out of Saudi Arabia, the WHOIS information (Fig 19) says otherwise. According to WHOIS, the domain was registered by one “Sami Pasha” in the Punjab province of Pakistan.

Figure 18: Contact information for the domain

Figure 19: WHOIS information for the domain

Finally, we show an analysis of the malware data exfiltration conducted through network traffic capture in Wireshark (Figs 20 and 21).

Figure 20: Malware data exfiltration via network traffic capture in Wireshark.

Figure 21: Malware data exfiltration via network traffic capture in Wireshark.

Blue Hexagon’s deep learning-based threat protection platform flagged the domain as malicious and monitored it for 48 hours for any additional signs of malicious activity, revealing the following interesting information:

  • At a given time the domain would only host a single malware executable—an information stealer used to infect the victims’ systems;
  • Although the domain had hosted two directories, named cgi-bin and x which suggested that domain could host websites, neither of these was accessible for further investigation for the first 24 hours of activity; and,
  • The purpose of these two directories was later revealed when both became accessible to the public, which is when it was discovered that they were hosting two phishing websites. An inventory of the indicators of compromise associated with these phishing websites includes: 

Fake email address abused by the threat actor:


 Spoofed email addresses abused by the threat actor:


 Email subjects:

  •  “Attached Purchase order”
  •  “Quotation needed Asap”

 Email attachment filenames:

  •  “Purchase Order.doc”
  •  “Purchase Order 74802 Port Jo’burg – Copy.doc”

Executive Impersonation: Threat actor impersonating the identity of the chief financial officer for CSPC Holdings Ltd, a Chinese pharmaceutical company.

  • CFO CSPC Holdings Ltd, +86 4279002 (Chinese pharmaceutical company)

 SHA-256 hashes of RTF documents carrying exploits:

  • 2e30907ebfafe954f3184e0310c5c98bcae55255963189e90a4e85f263a7bf36
  • 045d103839f990398a9ec111dcaecc1569c3c14fc5fde80d8184f16283871d05
  • 7241c1b47c7384df905993859aac13c4b7fa0cbe347fe38900006c4c2f0a089a
  • 0f5866ca5a27a601707889968482cf528db3b0433a595ddf1863833707a78289
  • 8ea16f07373523c412c2fa8969efdc2b0f90850bb5458c042f1f81caf9fa681d


  • (hosted the payloads)

 URLs which hosted payloads:

  • hxxp://
  • hxxp://
  • hxxp://
  • hxxp://
  • hxxp://
  • hxxp://

SHA-256 hashes of malware executables:

  • 013de5b705ceb9cb91d8954665152d9e8f971aead2bf35fe26d01169a8bdc9d8
  • dc0e432a41aa55a2a6ec9bfcf1e2a61648901df3f259be2880597b5322e650a8
  • 17f174e91cf5a59b177c2bb08b632414878a9efb09597eb36a9af86ad36c7f1d
  • 22b2e991d19f3998ef9004d0222fa49935b19d15d717a8bc38a26e7d5731e9d8
  • c00cdd76198bd70328ff3d2cf17904710d51ef16b0b2bbd6d3d838f078ecf567

 SMTP mail servers used for data exfiltration


 URLs which hosted the phishing sites:

  • hxxp:// (Rogue Chase Bank Login Page)
  • hxxp:// (Rogue Chase Bank Identity Verification Page)
  • hxxp:// (Phishing website under development)