General
-
Target
1110_801396004406.doc
-
Size
522KB
-
Sample
211110-s4rqjaeecr
-
MD5
d25f2a1315e8f0cad8927fbf7b36b5c9
-
SHA1
8aa4bd92e2382bcf7f931e5b664355309631569c
-
SHA256
ce3b1bca503c703866945dc81edf9aca6988eb4183672a26f08cfbad3287b123
-
SHA512
e04a65752597808036639f947ae3adcfd7b5d9a1efe1732a44b9d4dbaa167bdab802303354380e8096fd2fbe60e035c0206e3d4f8dc3508e43b6f6a9e984755b
Static task
static1
Behavioral task
behavioral1
Sample
1110_801396004406.doc
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
1110_801396004406.doc
Resource
win10-en-20211104
Malware Config
Extracted
hancitor
0411_kdzm
http://sucinenve.com/8/forum.php
http://foutpospaws.ru/8/forum.php
http://majoirtains.ru/8/forum.php
Targets
-
-
Target
1110_801396004406.doc
-
Size
522KB
-
MD5
d25f2a1315e8f0cad8927fbf7b36b5c9
-
SHA1
8aa4bd92e2382bcf7f931e5b664355309631569c
-
SHA256
ce3b1bca503c703866945dc81edf9aca6988eb4183672a26f08cfbad3287b123
-
SHA512
e04a65752597808036639f947ae3adcfd7b5d9a1efe1732a44b9d4dbaa167bdab802303354380e8096fd2fbe60e035c0206e3d4f8dc3508e43b6f6a9e984755b
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
suricata: ET MALWARE Tordal/Hancitor/Chanitor Checkin
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-