General
-
Target
hancitor.dll
-
Size
893KB
-
Sample
211123-tpjbaadge4
-
MD5
10f35ddd335ecd684cecf96372aac468
-
SHA1
942574b14f31d8f6fa53ba52362eb1d44ca68735
-
SHA256
cf4adca8773145cf0a1d4ba32d555643442e14e9181ae8450bfb79ab86144914
-
SHA512
126bcd8400f551a30f7b0ae5237a85de3df5fb9868d8d21e1e66dfe1fb5c9f1df3d3ccd4432cc59e34829c6f5658029a2487db084194b2697a5f669c1fcd512a
Static task
static1
Behavioral task
behavioral1
Sample
hancitor.dll.doc
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
hancitor.dll.doc
Resource
win10-en-20211014
Malware Config
Extracted
hancitor
2311_nsdir
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Targets
-
-
Target
hancitor.dll
-
Size
893KB
-
MD5
10f35ddd335ecd684cecf96372aac468
-
SHA1
942574b14f31d8f6fa53ba52362eb1d44ca68735
-
SHA256
cf4adca8773145cf0a1d4ba32d555643442e14e9181ae8450bfb79ab86144914
-
SHA512
126bcd8400f551a30f7b0ae5237a85de3df5fb9868d8d21e1e66dfe1fb5c9f1df3d3ccd4432cc59e34829c6f5658029a2487db084194b2697a5f669c1fcd512a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-