General

  • Target

    01b4c1b05cda2b5f8683735cfd3169d6

  • Size

    431KB

  • Sample

    231229-x6jvxsbaaj

  • MD5

    01b4c1b05cda2b5f8683735cfd3169d6

  • SHA1

    1fd8b0546820602d93b2f66abd6214ebe6b1dd17

  • SHA256

    1daf0bbe815341fd6e81fcf7685c519e25a70f29bab084d7f9e5cdb335622081

  • SHA512

    debd6396319466fac726ba9214129526e316876e7d6ca7b0335ed08c59d03ef1fad85fc9ad9a8ec98ea3a3b31d88b920953c1e43215426604ee4d03e3666e361

  • SSDEEP

    12288:4V9iQsDr8NnClDfKTFi1w06/vbOes1AOrk4P:4VXkr8NCNfKB30AOesoI

Malware Config

Extracted

Family

hancitor

Botnet

3008_hsdj8

C2

http://buichely.com/8/forum.php

http://gratimen.ru/8/forum.php

http://waliteriter.ru/8/forum.php

Targets

    • Target

      01b4c1b05cda2b5f8683735cfd3169d6

    • Size

      431KB

    • MD5

      01b4c1b05cda2b5f8683735cfd3169d6

    • SHA1

      1fd8b0546820602d93b2f66abd6214ebe6b1dd17

    • SHA256

      1daf0bbe815341fd6e81fcf7685c519e25a70f29bab084d7f9e5cdb335622081

    • SHA512

      debd6396319466fac726ba9214129526e316876e7d6ca7b0335ed08c59d03ef1fad85fc9ad9a8ec98ea3a3b31d88b920953c1e43215426604ee4d03e3666e361

    • SSDEEP

      12288:4V9iQsDr8NnClDfKTFi1w06/vbOes1AOrk4P:4VXkr8NCNfKB30AOesoI

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks