General

  • Target

    20210722_181212_4def76cfce8a580cec033f3a4771810de7cff54191f57dd58fea550c39fda8dc_0722_0218087385.xls

  • Size

    343KB

  • Sample

    210722-r5b5mwb12n

  • MD5

    1664a21b31abc809b41ef04bef2b83d3

  • SHA1

    e78ecacd1c0120899af55a08b221c2a26e8b1cec

  • SHA256

    4def76cfce8a580cec033f3a4771810de7cff54191f57dd58fea550c39fda8dc

  • SHA512

    c046609048f582b2ffa38c3ba4100772aed64ef1da72ae89a54b2866abd0ec2f8bc0563913295856cce0b0b4163375ea36b465db50a1df13da7b5fb4d38b74d0

Malware Config

Extracted

Family

hancitor

Botnet

2207_xwpi67

C2

http://tholeferli.com/8/forum.php

http://aidgodown.ru/8/forum.php

http://relifleappin.ru/8/forum.php

Extracted

Family

fickerstealer

C2

pospvisis.com:80

Targets

    • Target

      20210722_181212_4def76cfce8a580cec033f3a4771810de7cff54191f57dd58fea550c39fda8dc_0722_0218087385.xls

    • Size

      343KB

    • MD5

      1664a21b31abc809b41ef04bef2b83d3

    • SHA1

      e78ecacd1c0120899af55a08b221c2a26e8b1cec

    • SHA256

      4def76cfce8a580cec033f3a4771810de7cff54191f57dd58fea550c39fda8dc

    • SHA512

      c046609048f582b2ffa38c3ba4100772aed64ef1da72ae89a54b2866abd0ec2f8bc0563913295856cce0b0b4163375ea36b465db50a1df13da7b5fb4d38b74d0

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Win32/Ficker Stealer Activity

    • suricata: ET MALWARE Win32/Ficker Stealer Activity M3

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks