General

  • Target

    1027_1765350383.doc

  • Size

    416KB

  • Sample

    211027-snv31shbgp

  • MD5

    e6db5e050795eba10ce076638b7602e7

  • SHA1

    0ed70e1d3b19dc8925354b70ab64d4f03cd3a30c

  • SHA256

    cd78616ead76bc16141933527b22421fb65a160ec3f3d43ac158c411f0ba8b17

  • SHA512

    8d1b5baaa35a36aec830a359547676b363709f8a158e77678a47acd3387bb136fec9da84c2f92fbac6b6864a5dd6b49ecc774cc83a286811bdf709a4055348d0

Malware Config

Targets

    • Target

      1027_1765350383.doc

    • Size

      416KB

    • MD5

      e6db5e050795eba10ce076638b7602e7

    • SHA1

      0ed70e1d3b19dc8925354b70ab64d4f03cd3a30c

    • SHA256

      cd78616ead76bc16141933527b22421fb65a160ec3f3d43ac158c411f0ba8b17

    • SHA512

      8d1b5baaa35a36aec830a359547676b363709f8a158e77678a47acd3387bb136fec9da84c2f92fbac6b6864a5dd6b49ecc774cc83a286811bdf709a4055348d0

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

      suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks