General

  • Target

    df5926ad349dad39884d0a71f8c7318b

  • Size

    534KB

  • Sample

    211019-wza4rshbgr

  • MD5

    df5926ad349dad39884d0a71f8c7318b

  • SHA1

    de672dfb061f7f0d62940800f60ea963dc3cce3b

  • SHA256

    6f67beb15edea5f47a2ca655bca9a534e5944e3704a916a2b3d00ed7790e25f0

  • SHA512

    98ecd2118850fa1ce7c50554e434a7f7580926d7972abe5ca7a9a6a32d5b5771b598bbab0c7dd49a96157dff7d5451e41249d095d5664b63a72cef14ebc95b3a

Malware Config

Targets

    • Target

      df5926ad349dad39884d0a71f8c7318b

    • Size

      534KB

    • MD5

      df5926ad349dad39884d0a71f8c7318b

    • SHA1

      de672dfb061f7f0d62940800f60ea963dc3cce3b

    • SHA256

      6f67beb15edea5f47a2ca655bca9a534e5944e3704a916a2b3d00ed7790e25f0

    • SHA512

      98ecd2118850fa1ce7c50554e434a7f7580926d7972abe5ca7a9a6a32d5b5771b598bbab0c7dd49a96157dff7d5451e41249d095d5664b63a72cef14ebc95b3a

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

      suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks