General

  • Target

    0524_4109399728218 (1).doc

  • Size

    1.3MB

  • Sample

    220919-d5fmbseeb6

  • MD5

    14f4c470c207e22c3b0a4efa7b4200e8

  • SHA1

    21180195396580a9ade32b589490cf3bc94d3b5b

  • SHA256

    0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec

  • SHA512

    4adc4275a9105bf94bdce4b9d5821026d99a4adf16579b1b2b23495efbd55cc7bc90a129248a9902c7c75828eac9ac665c8a34c203b428748d9f7b8a80b76823

  • SSDEEP

    24576:nEIjrPUaphvGvGUZ93/semhXp7AsWIKHaY8k5faaboEy6r8zz1:n/jhvGvGU93097AFIKbv0WY/1

Malware Config

Extracted

Family

hancitor

Botnet

2405_pin43

C2

http://thowerteigime.com/8/forum.php

http://euvereginumet.ru/8/forum.php

http://rhopulforopme.ru/8/forum.php

Targets

    • Target

      0524_4109399728218 (1).doc

    • Size

      1.3MB

    • MD5

      14f4c470c207e22c3b0a4efa7b4200e8

    • SHA1

      21180195396580a9ade32b589490cf3bc94d3b5b

    • SHA256

      0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec

    • SHA512

      4adc4275a9105bf94bdce4b9d5821026d99a4adf16579b1b2b23495efbd55cc7bc90a129248a9902c7c75828eac9ac665c8a34c203b428748d9f7b8a80b76823

    • SSDEEP

      24576:nEIjrPUaphvGvGUZ93/semhXp7AsWIKHaY8k5faaboEy6r8zz1:n/jhvGvGU93097AFIKbv0WY/1

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks