General

  • Target

    0817_8340561414.doc

  • Size

    837KB

  • Sample

    210817-7k7e9ljq1a

  • MD5

    92616c2389cfc190c97b4eb3672822fe

  • SHA1

    1b5505094da6d6de16c64daf893e0b0738636fc2

  • SHA256

    a203ec9f2d391edff362cb29efbd311a780cb427c195c364d4547e21cfd70be3

  • SHA512

    ab2ed9f005360a5cef8d0eac5636f1e03d849c96548efe03dd684d1d5714281cbf0a9c2e975231613e0e141d2bd41a04fff895dab026777385c05051359066e4

Malware Config

Extracted

Family

hancitor

Botnet

1608_febd

C2

http://patiennerrhe.com/8/forum.php

http://thougolograrly.ru/8/forum.php

http://chopprousite.ru/8/forum.php

Targets

    • Target

      0817_8340561414.doc

    • Size

      837KB

    • MD5

      92616c2389cfc190c97b4eb3672822fe

    • SHA1

      1b5505094da6d6de16c64daf893e0b0738636fc2

    • SHA256

      a203ec9f2d391edff362cb29efbd311a780cb427c195c364d4547e21cfd70be3

    • SHA512

      ab2ed9f005360a5cef8d0eac5636f1e03d849c96548efe03dd684d1d5714281cbf0a9c2e975231613e0e141d2bd41a04fff895dab026777385c05051359066e4

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks