Behavioral task
behavioral1
Sample
Hancitor.docx
Resource
win7-20221111-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Hancitor.docx
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
Hancitor.zip
-
Size
522KB
-
MD5
7bbe504e5a8ab05829fcc014a9c30256
-
SHA1
86a6517e965d13baf41ede96e29b1eae29ae8f56
-
SHA256
cfdb5ee08b5bec5f5428d3f4f242328922336b38ce8ea9a9e9b71d76f8436b4a
-
SHA512
5cf944d9d02f26d6116f03b08057d9839a038f53e0bbe85af5d1ba037463b8ff9744890c0e08840214959cd26f6e3bd3097b20644981dbecbb7b464acd159690
-
SSDEEP
12288:3PPgbn6aKgDrRbVJqGem2P2DqftUFSAgSNb:fPWYKdbH4ESGIM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Hancitor.docx office_macro_on_action -
resource static1/unpack001/Hancitor.docx
Files
-
Hancitor.zip.zip
-
Hancitor.docx.doc .docx windows office2003
ThisDocument
Module1
Module2
Module3