General

  • Target

    0211_54092248132681.doc

  • Size

    332KB

  • Sample

    210211-mpml92m686

  • MD5

    488a65d8f5675c2489c93282964d0e33

  • SHA1

    f5500e1f3fd640b6a92cded055d34241f3a1afb6

  • SHA256

    762fdd5227b61802201fc081a28feb0c486908beb2e1fe56123b65fc851bcf66

  • SHA512

    a7dece421dd939966f9983633863cfe674a37ffd9fd6d4caf9e8a063727950c5c5ceba3666d222ab09b832211a5e64c4fa0c2e77aec1dd13bf7a19d5a4008f8d

Malware Config

Extracted

Family

hancitor

Botnet

1102_heid89

C2

http://nuencres.com/8/forum.php

http://matuattheires.ru/8/forum.php

http://desuctoette.ru/8/forum.php

Targets

    • Target

      0211_54092248132681.doc

    • Size

      332KB

    • MD5

      488a65d8f5675c2489c93282964d0e33

    • SHA1

      f5500e1f3fd640b6a92cded055d34241f3a1afb6

    • SHA256

      762fdd5227b61802201fc081a28feb0c486908beb2e1fe56123b65fc851bcf66

    • SHA512

      a7dece421dd939966f9983633863cfe674a37ffd9fd6d4caf9e8a063727950c5c5ceba3666d222ab09b832211a5e64c4fa0c2e77aec1dd13bf7a19d5a4008f8d

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Modifies WinLogon to allow AutoLogon

      Enables rebooting of the machine without requiring login credentials.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks