General

  • Target

    c6516d10f79d45c87d738b32eb9184b1

  • Size

    1.3MB

  • Sample

    221108-nrbrbsebf2

  • MD5

    c6516d10f79d45c87d738b32eb9184b1

  • SHA1

    e5ee7130a903c90786c2c09f5c92edc8d2ad7f23

  • SHA256

    c359366e6f3523f42366ffed9bc8161abcaa3ddd5307f69f883b615cfc60df1d

  • SHA512

    fc9a77c3bbdb5684bd7a6e097fa571bf893b59cb683fffb976c20f285fa1fb201f5c8acad1132fa346a34fc4f5a43755d380602b83e352479a6bdba7aad1e7b4

  • SSDEEP

    24576:JEIZ4wA74D4SQKxZcy8gthDWL/chYusVNVQK0U/k8k:J+wJD4QZh/qjKMn70uk8

Malware Config

Extracted

Family

hancitor

Botnet

2306_vensip

C2

http://extilivelly.com/8/forum.php

http://cludimetifte.ru/8/forum.php

http://sakincesed.ru/8/forum.php

Targets

    • Target

      c6516d10f79d45c87d738b32eb9184b1

    • Size

      1.3MB

    • MD5

      c6516d10f79d45c87d738b32eb9184b1

    • SHA1

      e5ee7130a903c90786c2c09f5c92edc8d2ad7f23

    • SHA256

      c359366e6f3523f42366ffed9bc8161abcaa3ddd5307f69f883b615cfc60df1d

    • SHA512

      fc9a77c3bbdb5684bd7a6e097fa571bf893b59cb683fffb976c20f285fa1fb201f5c8acad1132fa346a34fc4f5a43755d380602b83e352479a6bdba7aad1e7b4

    • SSDEEP

      24576:JEIZ4wA74D4SQKxZcy8gthDWL/chYusVNVQK0U/k8k:J+wJD4QZh/qjKMn70uk8

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks