General

  • Target

    0817_7712656277.doc

  • Size

    837KB

  • Sample

    210817-bn1a1jlmfj

  • MD5

    735ab94632f5dbe563bd079f5b463c8e

  • SHA1

    a5706b7cb3d821b25033a0788bfeebe79660fc77

  • SHA256

    bed8af7c63d7d08df49c6b5381e683f996587694825c60947fec7d48b3ab9725

  • SHA512

    8fb8308f10bae77098bd90718b3e04b352ecbc748fec3dc80cec74d4931e1d72948620b0bf48bc89f2ec27547550c00701892d2edbbccf775c28a9afc83b79b5

Malware Config

Extracted

Family

hancitor

Botnet

1608_febd

C2

http://patiennerrhe.com/8/forum.php

http://thougolograrly.ru/8/forum.php

http://chopprousite.ru/8/forum.php

Targets

    • Target

      0817_7712656277.doc

    • Size

      837KB

    • MD5

      735ab94632f5dbe563bd079f5b463c8e

    • SHA1

      a5706b7cb3d821b25033a0788bfeebe79660fc77

    • SHA256

      bed8af7c63d7d08df49c6b5381e683f996587694825c60947fec7d48b3ab9725

    • SHA512

      8fb8308f10bae77098bd90718b3e04b352ecbc748fec3dc80cec74d4931e1d72948620b0bf48bc89f2ec27547550c00701892d2edbbccf775c28a9afc83b79b5

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks