General

  • Target

    1b8f5b13d79bd9de5c10dc79514ce51b

  • Size

    1.3MB

  • Sample

    221108-nrah9sebe8

  • MD5

    1b8f5b13d79bd9de5c10dc79514ce51b

  • SHA1

    a23aeb990164016156951ab1707787122748c8e4

  • SHA256

    eba7c89f492f23bb3cc86520cdd0463be93cdde7ce12674ddb2a109bb4b2bf5c

  • SHA512

    c68026fef436aeed967d560740539417fd3e6603a9f34312bf86469947f5dc3beffae48e012958865825d73624274e39590444543f71e8a770ce4a0284d551e5

  • SSDEEP

    24576:bEIZ4wA74D4SQKxZcy8gthDWs/chYusVNVQK0U/B89:b+wJD4QZh/qKKMn70uB8

Malware Config

Extracted

Family

hancitor

Botnet

2306_vensip

C2

http://extilivelly.com/8/forum.php

http://cludimetifte.ru/8/forum.php

http://sakincesed.ru/8/forum.php

Targets

    • Target

      1b8f5b13d79bd9de5c10dc79514ce51b

    • Size

      1.3MB

    • MD5

      1b8f5b13d79bd9de5c10dc79514ce51b

    • SHA1

      a23aeb990164016156951ab1707787122748c8e4

    • SHA256

      eba7c89f492f23bb3cc86520cdd0463be93cdde7ce12674ddb2a109bb4b2bf5c

    • SHA512

      c68026fef436aeed967d560740539417fd3e6603a9f34312bf86469947f5dc3beffae48e012958865825d73624274e39590444543f71e8a770ce4a0284d551e5

    • SSDEEP

      24576:bEIZ4wA74D4SQKxZcy8gthDWs/chYusVNVQK0U/B89:b+wJD4QZh/qKKMn70uB8

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks