Executive Summary / Finding

A phishing email campaign originating from compromised libero.it email accounts successfully delivered a malicious RAR5 archive containing a trojanized executable disguised as legitimate marketing material. Static analysis confirms the payload functions as a trojan loader, leveraging runtime API resolution and cryptographic routines to evade detection and dynamically load secondary payloads. While no plaintext command-and-control (C2) infrastructure was identified statically, the malware demonstrates behaviors consistent with staged payload execution and post-compromise capability expansion.

This activity represents a confirmed malware delivery attempt with high likelihood of follow-on compromise if executed, requiring immediate containment, IOC enrichment, and user awareness reinforcement.


5W + H Analysis

Who

Sender Accounts

What

When

Email sent on

Saturday, 4 October 2025 at 19:20:35 +0200 (UTC: 17:20:37)

Where