General

  • Target

    81c4485a834880c3becd7e3eefd841a3

  • Size

    850KB

  • Sample

    231219-xzwk5sdeh2

  • MD5

    81c4485a834880c3becd7e3eefd841a3

  • SHA1

    a1d76eaf5c4f787fc34528e46dc9cda5d9d5ea28

  • SHA256

    87df253ffe9d319d5a315b3361a1d13553c3bc4bf233e5c93a8624b5993f4abe

  • SHA512

    09076ecc53e4ad0d27c783918ca6c74dbf81cdb11c47c232afe8044e372aeb4920a488e1320c0cad9267d2fb747e2dc3e9e7c265021bba6b3dbec14daffe104f

  • SSDEEP

    12288:OB+jxjYxBs/RPYdf2aCQeg1Mfpfm6ukJm9voPZqXStgi2Tz:OSjeG/usvQFMfQmJmVsZ/C/

Malware Config

Extracted

Family

hancitor

Botnet

0710_pkrdv

C2

http://strictence.com/8/forum.php

http://wimberels.ru/8/forum.php

http://cithernista.ru/8/forum.php

Targets

    • Target

      81c4485a834880c3becd7e3eefd841a3

    • Size

      850KB

    • MD5

      81c4485a834880c3becd7e3eefd841a3

    • SHA1

      a1d76eaf5c4f787fc34528e46dc9cda5d9d5ea28

    • SHA256

      87df253ffe9d319d5a315b3361a1d13553c3bc4bf233e5c93a8624b5993f4abe

    • SHA512

      09076ecc53e4ad0d27c783918ca6c74dbf81cdb11c47c232afe8044e372aeb4920a488e1320c0cad9267d2fb747e2dc3e9e7c265021bba6b3dbec14daffe104f

    • SSDEEP

      12288:OB+jxjYxBs/RPYdf2aCQeg1Mfpfm6ukJm9voPZqXStgi2Tz:OSjeG/usvQFMfQmJmVsZ/C/

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks