General

  • Target

    moexx.bin

  • Size

    1.8MB

  • Sample

    220201-zejrysbgc9

  • MD5

    d90f5bb9e103ea6935e453a8bafe4a66

  • SHA1

    20b37f0d541542925ae321a6350b64a04abaa3b2

  • SHA256

    abc91dfef90476ff6e3406b62b085ef1e84585aea3e9d80dbe3aa21597ff5995

  • SHA512

    f5be489c65295d22f70a101aff1a79cf6e9c01f0d3f00c1424a606e2d3c24c70d5eff79dac3cadfb9e5ebe4a1710dcb21e7536cde02a37e7b73b872e90b5fb88

Malware Config

Targets

    • Target

      moexx.bin

    • Size

      1.8MB

    • MD5

      d90f5bb9e103ea6935e453a8bafe4a66

    • SHA1

      20b37f0d541542925ae321a6350b64a04abaa3b2

    • SHA256

      abc91dfef90476ff6e3406b62b085ef1e84585aea3e9d80dbe3aa21597ff5995

    • SHA512

      f5be489c65295d22f70a101aff1a79cf6e9c01f0d3f00c1424a606e2d3c24c70d5eff79dac3cadfb9e5ebe4a1710dcb21e7536cde02a37e7b73b872e90b5fb88

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Blocklisted process makes network request

    • Sets service image path in registry

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks