General

  • Target

    9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa

  • Size

    322KB

  • Sample

    220131-vhe6qaafd7

  • MD5

    4ca02d884e80c7333257d762e6964805

  • SHA1

    85c47af2826ab8979b09df68a1ff5a7cb35fed42

  • SHA256

    9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa

  • SHA512

    e40819c9090c793644bfb52bba15ba346a20bbd2027dcd1e02935433777f8a3c8dc15dce278514ca024b35f559399b82d0419a390c674bcf7d93a463f1907980

Malware Config

Extracted

Family

hancitor

Botnet

1609_dkytr

C2

http://plivatecez.com/8/forum.php

http://agarreaters.ru/8/forum.php

http://weratiands.ru/8/forum.php

Targets

    • Target

      9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa

    • Size

      322KB

    • MD5

      4ca02d884e80c7333257d762e6964805

    • SHA1

      85c47af2826ab8979b09df68a1ff5a7cb35fed42

    • SHA256

      9532743ba2305e568e69d5086a05da30436b30be733548c4d28222bfa9f456fa

    • SHA512

      e40819c9090c793644bfb52bba15ba346a20bbd2027dcd1e02935433777f8a3c8dc15dce278514ca024b35f559399b82d0419a390c674bcf7d93a463f1907980

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks