Behavioral task
behavioral1
Sample
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe
Resource
win10v2004-20220721-en
General
-
Target
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f
-
Size
25KB
-
MD5
cc1e80f0566eb718d4473a31bbdcb812
-
SHA1
95a39bfe3b6146d5f5a7f77c22e8bc4c2b078b9c
-
SHA256
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f
-
SHA512
903035ae6820e3f78dad1f1063414794d3507d7f526be256cf00e3da5e174d90b3aa729b27993b7690fc3607fa655dea0928b31b20900c688f471635092bf7d1
-
SSDEEP
384:7aEcfgChsRCppm6ba2z+uVetR7DDBuBziBH4v5S029CBYYztiE4Ufrc0UKWEQWMH:7KsRswq8lczikS02wYYzprhpbQacbf9
Malware Config
Extracted
hancitor
2210_782133
http://pansoniterger.com/4/forum.php
http://penstinteic.ru/4/forum.php
http://rmopautham.ru/4/forum.php
Signatures
-
Hancitor family
Files
-
d07d5d1b63793df8c6adc2cf59bfdb8e97b32dbaa99c101b00a31a45172c329f.exe windows x86
61994e37ff5c591f92cfcfebd25838de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
InternetSetOptionA
InternetQueryOptionA
InternetReadFile
InternetConnectA
InternetCloseHandle
iphlpapi
GetAdaptersAddresses
psapi
GetProcessImageFileNameA
EnumProcesses
ntdll
RtlDecompressBuffer
kernel32
GetComputerNameA
CreateFileA
GetTempFileNameA
HeapAlloc
HeapFree
GetProcessHeap
GetVersion
lstrcpyA
lstrlenA
GetWindowsDirectoryA
GetVolumeInformationA
ExitProcess
Sleep
GetProcAddress
VirtualAlloc
VirtualFree
VirtualAllocEx
VirtualFreeEx
OpenProcess
TerminateProcess
CreateThread
GetProcessId
GetLastError
WriteProcessMemory
GetThreadContext
SetThreadContext
ResumeThread
WriteFile
CloseHandle
GetSystemInfo
lstrcmpiA
lstrcatA
LoadLibraryA
GetModuleHandleA
CreateProcessA
GetEnvironmentVariableA
GetTempPathA
user32
wsprintfA
advapi32
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptDecrypt
CryptDestroyKey
CryptDeriveKey
CryptReleaseContext
CryptAcquireContextA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 528B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ