General

  • Target

    0721_6141824377.xls

  • Size

    387KB

  • Sample

    210721-2dnw6ptgyx

  • MD5

    338378927b00cbe6aa8c6620057755f9

  • SHA1

    3fd7b142d7e0dc0ae8350197585c2d0744027c1c

  • SHA256

    e746a6d562555f4d2f840727c9a9f8967dddcf100bd8d5f48a6209b76dd43375

  • SHA512

    3332683ff040da4e785a54eb9246deceaa075ec38a289a2a257dadf336363dea30132c0534c40903ea6ed5bbc445f4e301f3867868cfcc737167c6d721b26a11

Malware Config

Extracted

Family

hancitor

Botnet

1907_hjfsd

C2

http://thervidolown.com/8/forum.php

http://wiltuslads.ru/8/forum.php

http://anithedtatione.ru/8/forum.php

Extracted

Family

fickerstealer

C2

pospvisis.com:80

Targets

    • Target

      0721_6141824377.xls

    • Size

      387KB

    • MD5

      338378927b00cbe6aa8c6620057755f9

    • SHA1

      3fd7b142d7e0dc0ae8350197585c2d0744027c1c

    • SHA256

      e746a6d562555f4d2f840727c9a9f8967dddcf100bd8d5f48a6209b76dd43375

    • SHA512

      3332683ff040da4e785a54eb9246deceaa075ec38a289a2a257dadf336363dea30132c0534c40903ea6ed5bbc445f4e301f3867868cfcc737167c6d721b26a11

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks