General

  • Target

    11b1395802f5598806562d9dc11542bf56b19e5278c521a556a7de8ca17723ee

  • Size

    227KB

  • Sample

    220604-baargsccf8

  • MD5

    00ed3b913530f8a97e7280671f5d3a95

  • SHA1

    502e2bf2a313c60ef2c5b0cddef2afe5abc9b546

  • SHA256

    11b1395802f5598806562d9dc11542bf56b19e5278c521a556a7de8ca17723ee

  • SHA512

    24a47ff6c13f9376719884158db4c605b227c8c0f4be02caeda5283ea4fe9ec32c2da9e5c3b0fc35a32ea8a1708ee69ab57a9fe2f6eb43ca76232da70004b18b

Malware Config

Extracted

Family

hancitor

Botnet

1912_372823

C2

http://howeelyzuq.com/4/forum.php

http://thriondery.ru/4/forum.php

http://craledlopj.ru/4/forum.php

Targets

    • Target

      Tracking#6902522331741.vbs

    • Size

      592KB

    • MD5

      393258a792991fdab17305e275e5fd31

    • SHA1

      231f60bdb55fc4597a2e4d53d4a43d66429207d2

    • SHA256

      8bde2931a468cc81994985ec803bda715ea70ef2337defc252f404efc8650a51

    • SHA512

      5d67586c90180f0637379bc7537b180a9083e5a125a9927a7320151a6a8e23a0dffefddccc5712679d1c25c3baddf6e5ac34fa41ff1230484d51c9a7424ae644

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks