General

  • Target

    8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51

  • Size

    592KB

  • Sample

    220604-a99jesgcgn

  • MD5

    393258a792991fdab17305e275e5fd31

  • SHA1

    231f60bdb55fc4597a2e4d53d4a43d66429207d2

  • SHA256

    8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51

  • SHA512

    5d67586c90180f0637379bc7537b180a9083e5a125a9927a7320151a6a8e23a0dffefddccc5712679d1c25c3baddf6e5ac34fa41ff1230484d51c9a7424ae644

Malware Config

Extracted

Family

hancitor

Botnet

1912_372823

C2

http://howeelyzuq.com/4/forum.php

http://thriondery.ru/4/forum.php

http://craledlopj.ru/4/forum.php

Targets

    • Target

      8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51

    • Size

      592KB

    • MD5

      393258a792991fdab17305e275e5fd31

    • SHA1

      231f60bdb55fc4597a2e4d53d4a43d66429207d2

    • SHA256

      8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51

    • SHA512

      5d67586c90180f0637379bc7537b180a9083e5a125a9927a7320151a6a8e23a0dffefddccc5712679d1c25c3baddf6e5ac34fa41ff1230484d51c9a7424ae644

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks