General

  • Target

    49cb613e0241e2a1e3ac064f3465f887403f69d438775c15211a213d208a0f6c

  • Size

    163KB

  • Sample

    220625-f19qqaffel

  • MD5

    0470a08d9e4c7dd14a95adc5753f0eb4

  • SHA1

    e20ad5368273f15e2d5a34e80ffc1c72b9e43ee8

  • SHA256

    49cb613e0241e2a1e3ac064f3465f887403f69d438775c15211a213d208a0f6c

  • SHA512

    e64ce93037a872666d8f849377c6f831ee74ae2d1f9b03b04b0bd4cf4f51b587304d83a0f478bf9bc3f9ef50c07327c338aea913f0df6b517840e4d3b027ed12

Malware Config

Extracted

Family

hancitor

Botnet

2701_236743

C2

http://diermedir.com/4/forum.php

http://ussismates.ru/4/forum.php

http://wernmicaz.ru/4/forum.php

Targets

    • Target

      49cb613e0241e2a1e3ac064f3465f887403f69d438775c15211a213d208a0f6c

    • Size

      163KB

    • MD5

      0470a08d9e4c7dd14a95adc5753f0eb4

    • SHA1

      e20ad5368273f15e2d5a34e80ffc1c72b9e43ee8

    • SHA256

      49cb613e0241e2a1e3ac064f3465f887403f69d438775c15211a213d208a0f6c

    • SHA512

      e64ce93037a872666d8f849377c6f831ee74ae2d1f9b03b04b0bd4cf4f51b587304d83a0f478bf9bc3f9ef50c07327c338aea913f0df6b517840e4d3b027ed12

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks