General
-
Target
ff1a958a59a14af230ea15e62c472cd9
-
Size
576KB
-
Sample
211103-w8w3labehp
-
MD5
ff1a958a59a14af230ea15e62c472cd9
-
SHA1
ffd3513447cd33af6df142bbc249bc2b2be2b38a
-
SHA256
17c5c2c8d429dcea665e3d283b874228e01139453709e47e2c283a77fc49d537
-
SHA512
f8486e72f2dd78881891d642b09ee25d4e3a7af57ed936e61a2ed88390b29edfb2a4105c092272645f52801725696d6684ddb1617730dd42baf1fe052078f4c6
Static task
static1
Behavioral task
behavioral1
Sample
ff1a958a59a14af230ea15e62c472cd9.doc
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
ff1a958a59a14af230ea15e62c472cd9.doc
Resource
win10-en-20210920
Malware Config
Extracted
hancitor
0211_ponxwe
http://mettlybothe.com/8/forum.php
http://herstrairzoj.ru/8/forum.php
http://allonsetkes.ru/8/forum.php
Targets
-
-
Target
ff1a958a59a14af230ea15e62c472cd9
-
Size
576KB
-
MD5
ff1a958a59a14af230ea15e62c472cd9
-
SHA1
ffd3513447cd33af6df142bbc249bc2b2be2b38a
-
SHA256
17c5c2c8d429dcea665e3d283b874228e01139453709e47e2c283a77fc49d537
-
SHA512
f8486e72f2dd78881891d642b09ee25d4e3a7af57ed936e61a2ed88390b29edfb2a4105c092272645f52801725696d6684ddb1617730dd42baf1fe052078f4c6
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-