General

  • Target

    73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83

  • Size

    28KB

  • Sample

    211101-r6g4fafaap

  • MD5

    ce1e907e5709d82ce68748e16e53f3d1

  • SHA1

    6730bafd618c8ad45bbcc6054566cb34e9d156ee

  • SHA256

    73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83

  • SHA512

    d0f3803812655929b6ba1e2098269093a09e7b8fdba0b8fec43da15b2856c540101314b683555caf7cc770add122af20819ca002da67d61c30d314acb434ea83

Score
10/10

Malware Config

Extracted

Family

hancitor

Botnet

2405_pin43

C2

http://thowerteigime.com/8/forum.php

http://euvereginumet.ru/8/forum.php

http://rhopulforopme.ru/8/forum.php

Targets

    • Target

      73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83

    • Size

      28KB

    • MD5

      ce1e907e5709d82ce68748e16e53f3d1

    • SHA1

      6730bafd618c8ad45bbcc6054566cb34e9d156ee

    • SHA256

      73f6a487c5a63712da5f3d8f3af330ea31b6647afb62f2f082d0ab0f4481ad83

    • SHA512

      d0f3803812655929b6ba1e2098269093a09e7b8fdba0b8fec43da15b2856c540101314b683555caf7cc770add122af20819ca002da67d61c30d314acb434ea83

    Score
    8/10
    • Blocklisted process makes network request

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks