Jasper Alblas
Jasper Alblas
Mastering Data & Cybersec
Welcome to this walkthrough of the Phishing Emails in Action Room on TryHackMe. In this room we get more hands-on with phishing emails! Learn the different indicators of phishing attempts by examining actual phishing emails.

Room URL:
https://tryhackme.com/room/phishingemails2rytmuv
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.
Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, the higher the chances the recipient will click on a malicious link, download and execute the malicious file, or even send the prince of some country a wire transfer.
Warning: The samples throughout this room contain information from actual spam and/or phishing emails. Proceed with caution if you attempt to interact with any IP, domain, attachment, etc.
Answer: No answer needed
Here are the main points of the email investigation in the THM room:
service@paypal.com) but the actual email is unrelated (gibberish@sultanbogor.com).google.com, not PayPal.Overall takeaway: The email is a phishing attempt using spoofing and social engineering tactics, with a suspicious shortened link.
If you look at the mail from THM:

You can clearly see that the sender email address starts with noreply.
Answer: noreply
The email sample demonstrates several phishing techniques, including spoofed email addresses, pixel tracking, and link manipulation. It is crafted to look like a message from a mail distribution center, reinforced by a subject line featuring a fake tracking number. Although the link text matches the subject, Yahoo blocks both images and links in this email—likely because of tracking pixels hidden inside the message.
By inspecting the raw source, one can see an embedded image named Tracking.png, which acts as a tracking pixel that sends information back to the spammer’s server. Many email providers block such images automatically to protect users from being tracked. Additionally, the hyperlink ultimately leads to a suspicious domain, suggesting potential malware involvement.
You can easily see the domain in the pictures on the room.
To defang it you can use CyberChef:
The answer is devret[.]xyz.
Why we defang you wonder? It is so that you can not mistakenly click on a link here on my blog and get send to a malicious URL.
Answer: devret[.]xyz
Here’s a concise summary of this email sample:
This one was a a bit harder to find, but on the first screenshot it says Citrix:

Answer: Citrix
In this task we look at yet another email. Here are the main points:
z99@musacombi.online.Hmm, don’t really like this question! We need the hint to give us a link: https://www.consumeraffairs.com/news/police-warn-of-new-netflix-email-phishing-scam-121718.html
Here you can find the exact answer in the last sentence of the article.
Answer: forward the message to phishing@netflix.com
Here we go again! Let’s cover the main points:
Techniques used: Spoofed email address, BCCed recipient, urgency, poor grammar/typos, and a malicious attachment.
Sender spoofing: The email claims to be from Apple Support, but the real sender is gibberish@sumpremed.com.
BCC usage: The victim wasn’t directly addressed; instead, they were BCCed. The visible “recipient” address is another spoofed Apple‑like address meant to appear legitimate.
Urgency: The message implies action is required, pushing the victim to respond quickly.
Typos: Both the sender and recipient addresses contain clear errors—donoreply and payament—which signal low credibility.
Empty body: There is no email content at all; the entire attempt relies on the victim opening the attachment.
Suspicious attachment: The attached file is a .DOT template file (a Microsoft Word template format), which is unusual in legitimate communications.
Attachment contents: The file displays a large image mimicking an App Store receipt. Its embedded link includes Apple‑related keywords like apps and ios to appear legitimate.
A quick google search (or your favorite search engine!) gives us the answer: Blind Carbon Copy. It is quite similar to CC which you might be more familiar with: carbon copy. This means that whose address appears after the Cc: header would receive a copy of the message. Bcc is similar to this, but this time the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address.
Answer: Blind Carbon Copy
The message implies action is required, pushing the victim to respond quickly. We call this urgency.
Answer: Urgency
Let’s do this one last time! Promise me to never fall for phishing emails again after this room. 😉
You can find the answer on the screenshot in the room:

Answer: regasms.exe
In this room, we looked at various phishing samples.
Some of the samples shared similar techniques whereas, others introduced a new tactic for you to see and learn from.
Understanding how to detect phishing emails takes awareness training.
Visit the resources below to acquaint yourself with other signs to look out for in phishing emails.
Additional Resources:
The next room in this module: Phishing Emails 3
Answer: No answer needed.

Congratulations on completing Phishing Emails in Practice. This was a fun little room in which we got to practice identifying phishing emails. Great job on getting this far.
Come back soon for more walkthroughs of rooms on TryHackMe and HackTheBox, and other Cybersecurity discussions.
Find my other TryHackMe SOC Level 1 Path walkthrougs here.
Find my other walkthroughs here.
You are welcome to comment on this post, or share my post with friends.I would be even more grateful if you support me by buying me a cup of coffee:

I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link:
[…] Phishing Emails in Actions […]