General

  • Target

    089c846d6e0e740ee0a4a8b3bd409cad

  • Size

    612KB

  • Sample

    231230-atap6ahehr

  • MD5

    089c846d6e0e740ee0a4a8b3bd409cad

  • SHA1

    2ba96ba3055f35ce4c5b8d7acc5b99c11db02986

  • SHA256

    7336cd3bd33bed303b35a019ad2e354bc2a2bb3249291ba9cd2eb98ecf7bfedf

  • SHA512

    10b6ca55383aaa307246963870b293a757a22774a2f2d91698aab9e2f2355b134b9046da05a94866cc547d039ee10b3e5382c2e70976a08e134b9af005e2184b

  • SSDEEP

    12288:AV9iQsDr8NReCz3DFw7m/kdxoF3aHUp6BvNoywaMFsZjjotAd5Rsm:AVXkr8NUCz6voFqDisSI7

Malware Config

Extracted

Family

hancitor

Botnet

1808_plfr

C2

http://madmilons.com/8/forum.php

http://counteent.ru/8/forum.php

http://simatereare.ru/8/forum.php

Targets

    • Target

      089c846d6e0e740ee0a4a8b3bd409cad

    • Size

      612KB

    • MD5

      089c846d6e0e740ee0a4a8b3bd409cad

    • SHA1

      2ba96ba3055f35ce4c5b8d7acc5b99c11db02986

    • SHA256

      7336cd3bd33bed303b35a019ad2e354bc2a2bb3249291ba9cd2eb98ecf7bfedf

    • SHA512

      10b6ca55383aaa307246963870b293a757a22774a2f2d91698aab9e2f2355b134b9046da05a94866cc547d039ee10b3e5382c2e70976a08e134b9af005e2184b

    • SSDEEP

      12288:AV9iQsDr8NReCz3DFw7m/kdxoF3aHUp6BvNoywaMFsZjjotAd5Rsm:AVXkr8NUCz6voFqDisSI7

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks