General

  • Target

    aa14013aab2ff7beea20c14c710dafde5f4bd79d8e125f63ed38e788c6e4aa18

  • Size

    602KB

  • Sample

    220609-fg34tshbh5

  • MD5

    02782c8c2739ebc98df5b5bcfb758ead

  • SHA1

    409d28546f0589ba6f8af73c8cbb7328be717aba

  • SHA256

    aa14013aab2ff7beea20c14c710dafde5f4bd79d8e125f63ed38e788c6e4aa18

  • SHA512

    3907e36f23dea3337fee11696066c3f738f2c4587de39374267105c8fc8abeee6ffd761251478bab9d31bbed09d6c8c1495b4d4fb9c2cc782e0e9df542f7db9d

Malware Config

Extracted

Family

hancitor

Botnet

1912_372823

C2

http://howeelyzuq.com/4/forum.php

http://thriondery.ru/4/forum.php

http://craledlopj.ru/4/forum.php

Targets

    • Target

      aa14013aab2ff7beea20c14c710dafde5f4bd79d8e125f63ed38e788c6e4aa18

    • Size

      602KB

    • MD5

      02782c8c2739ebc98df5b5bcfb758ead

    • SHA1

      409d28546f0589ba6f8af73c8cbb7328be717aba

    • SHA256

      aa14013aab2ff7beea20c14c710dafde5f4bd79d8e125f63ed38e788c6e4aa18

    • SHA512

      3907e36f23dea3337fee11696066c3f738f2c4587de39374267105c8fc8abeee6ffd761251478bab9d31bbed09d6c8c1495b4d4fb9c2cc782e0e9df542f7db9d

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks