Static task
static1
Behavioral task
behavioral1
Sample
01c5604e330f1a1c2228041f0fe2b8ce52f63ae1c3eac3462829b9fa2fb30862.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
01c5604e330f1a1c2228041f0fe2b8ce52f63ae1c3eac3462829b9fa2fb30862.exe
Resource
win10v2004-20220414-en
General
-
Target
01c5604e330f1a1c2228041f0fe2b8ce52f63ae1c3eac3462829b9fa2fb30862
-
Size
93KB
-
MD5
cb2282bdd553623002a4b96ba3e1c192
-
SHA1
13e8a9d435ce72ec3d8344bcb1ef32bbc31752fb
-
SHA256
01c5604e330f1a1c2228041f0fe2b8ce52f63ae1c3eac3462829b9fa2fb30862
-
SHA512
065a6b2403dfb20becbcdc4471a0dff81f92cee407a6a65071f658ff18282e1161f275bdc91e1b5a6755f97a17cd2a051746054093d3a45e7313793e538ffadb
-
SSDEEP
768:UNUY6kQ20Y8/KXoYr9TalieQ8TLMVz0goNgLCcveduD+k4:k5GYcKYWWi3sYp0du2dy+k
Malware Config
Extracted
hancitor
1004_672193
http://camovethet.com/4/forum.php
http://sindicosi.ru/4/forum.php
http://hedtgowithen.ru/4/forum.php
Signatures
-
Hancitor family
Files
-
01c5604e330f1a1c2228041f0fe2b8ce52f63ae1c3eac3462829b9fa2fb30862.exe windows x86
8559cda00b61ee2180779641839dfc59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptDestroyKey
CryptDeriveKey
CryptReleaseContext
CryptAcquireContextA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
iphlpapi
GetAdaptersAddresses
kernel32
GetComputerNameA
CreateFileA
GetTempFileNameA
HeapAlloc
HeapFree
GetProcessHeap
VirtualQuery
GetVersion
lstrcpyA
lstrlenA
GetWindowsDirectoryA
GetVolumeInformationA
ExitProcess
Sleep
GetProcAddress
VirtualAlloc
VirtualFree
VirtualAllocEx
VirtualFreeEx
OpenProcess
TerminateProcess
CreateThread
GetProcessId
GetLastError
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
WriteFile
CloseHandle
GetSystemInfo
lstrcmpiA
lstrcatA
LoadLibraryA
GetModuleHandleA
CreateProcessA
GetEnvironmentVariableA
GetTempPathA
psapi
GetProcessImageFileNameA
EnumProcesses
user32
wsprintfA
wininet
InternetOpenA
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
InternetSetOptionA
InternetQueryOptionA
InternetReadFile
InternetConnectA
InternetCloseHandle
ntdll
RtlDecompressBuffer
Sections
.text Size: 61KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.SCY Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE