General

  • Target

    5be18cbb1860b0455aea51a7da859913

  • Size

    576KB

  • Sample

    211103-v6911abebn

  • MD5

    5be18cbb1860b0455aea51a7da859913

  • SHA1

    2faa9403ee58d08be028718d00df0142509d6848

  • SHA256

    0200a1a5dce110faa6c60d22bc1b426b36648a4c58ec9285f8bd41b77a62cc57

  • SHA512

    0a35616857bae4d3cd5b21e0b1e3b8b3ca9f591f561d4238ce4869c8fe6fd7dd56c947fee7129e676d4235823786fe1fc10a308035d833543970d04ee6850b0c

Malware Config

Targets

    • Target

      5be18cbb1860b0455aea51a7da859913

    • Size

      576KB

    • MD5

      5be18cbb1860b0455aea51a7da859913

    • SHA1

      2faa9403ee58d08be028718d00df0142509d6848

    • SHA256

      0200a1a5dce110faa6c60d22bc1b426b36648a4c58ec9285f8bd41b77a62cc57

    • SHA512

      0a35616857bae4d3cd5b21e0b1e3b8b3ca9f591f561d4238ce4869c8fe6fd7dd56c947fee7129e676d4235823786fe1fc10a308035d833543970d04ee6850b0c

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

      suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks