General

  • Target

    0722_0237470224.xls

  • Size

    343KB

  • Sample

    210722-gljxln4jb2

  • MD5

    c73029788f2847c8af6a9ba51d88d96f

  • SHA1

    87102bbd148bdb4cbe870684e52bcf7263c64301

  • SHA256

    76a26e4b4cd690fbf34db54af03d136428b81a9b6f0fb092fcb8c2afff092eb6

  • SHA512

    8bf2d113dbada7bd86f894d26f9a581b15c8ea259e0dad30a0908270952c9a9acdf55f0d9b8f200cdcb2909724c0954316eed5664c19ecf104ee5b4dc25e205c

Malware Config

Extracted

Family

hancitor

Botnet

2207_xwpi67

C2

http://tholeferli.com/8/forum.php

http://aidgodown.ru/8/forum.php

http://relifleappin.ru/8/forum.php

Extracted

Family

fickerstealer

C2

pospvisis.com:80

Targets

    • Target

      0722_0237470224.xls

    • Size

      343KB

    • MD5

      c73029788f2847c8af6a9ba51d88d96f

    • SHA1

      87102bbd148bdb4cbe870684e52bcf7263c64301

    • SHA256

      76a26e4b4cd690fbf34db54af03d136428b81a9b6f0fb092fcb8c2afff092eb6

    • SHA512

      8bf2d113dbada7bd86f894d26f9a581b15c8ea259e0dad30a0908270952c9a9acdf55f0d9b8f200cdcb2909724c0954316eed5664c19ecf104ee5b4dc25e205c

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks