General

  • Target

    0208_54741869750132.doc

  • Size

    803KB

  • Sample

    220209-tzk8maahf4

  • MD5

    7f6c623196d7e76c205b4fb898ad9be6

  • SHA1

    408bb5b4e8ac34ce3b70ba54e00e9858ced885c0

  • SHA256

    3a5648f7de99c4f87331c36983fc8adcd667743569a19c8dafdd5e8a33de154d

  • SHA512

    8a57b3c14fe3f6c7ea014f867924176d3b9c07ad6195b0e5fa877e16b55b1c23e4abfdf24b7e7a0dffafe8991d4878d98dad1419be03f27f64f0c95720542dee

Malware Config

Extracted

Family

hancitor

Botnet

0802_ff0912

C2

http://satursed.com/8/forum.php

http://sameastar.ru/8/forum.php

http://ludiesibut.ru/8/forum.php

Targets

    • Target

      0208_54741869750132.doc

    • Size

      803KB

    • MD5

      7f6c623196d7e76c205b4fb898ad9be6

    • SHA1

      408bb5b4e8ac34ce3b70ba54e00e9858ced885c0

    • SHA256

      3a5648f7de99c4f87331c36983fc8adcd667743569a19c8dafdd5e8a33de154d

    • SHA512

      8a57b3c14fe3f6c7ea014f867924176d3b9c07ad6195b0e5fa877e16b55b1c23e4abfdf24b7e7a0dffafe8991d4878d98dad1419be03f27f64f0c95720542dee

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks