General

  • Target

    48463e9423607e7e5fbb05b42a3bc4ae

  • Size

    623KB

  • Sample

    240107-hb7aeahbc9

  • MD5

    48463e9423607e7e5fbb05b42a3bc4ae

  • SHA1

    922f69f07b42322123a3ff3f8f6e63277d0deb70

  • SHA256

    cef7ccf63ab0648d312c44000f29f93d672e6a99a8ab5d08b599719d3f2ac23d

  • SHA512

    8e61c966467e0c4cf1edce45f25a43464d59f156c958c66169af4fbe6214e7ca6510995f5f8167ebca30813f70246d5164d1b77e6bc83b3255946780fc345bc8

  • SSDEEP

    12288:zV9iQsDr8NREUYfwg8I3HMzNK3Rb+jC4xU4WhO:zVXkr8N+UYhR3HMBK3RMeO

Malware Config

Extracted

Family

hancitor

Botnet

1908_jkdsf

C2

http://thookedaurce.com/8/forum.php

http://foolockpary.ru/8/forum.php

http://usitemithe.ru/8/forum.php

Targets

    • Target

      48463e9423607e7e5fbb05b42a3bc4ae

    • Size

      623KB

    • MD5

      48463e9423607e7e5fbb05b42a3bc4ae

    • SHA1

      922f69f07b42322123a3ff3f8f6e63277d0deb70

    • SHA256

      cef7ccf63ab0648d312c44000f29f93d672e6a99a8ab5d08b599719d3f2ac23d

    • SHA512

      8e61c966467e0c4cf1edce45f25a43464d59f156c958c66169af4fbe6214e7ca6510995f5f8167ebca30813f70246d5164d1b77e6bc83b3255946780fc345bc8

    • SSDEEP

      12288:zV9iQsDr8NREUYfwg8I3HMzNK3Rb+jC4xU4WhO:zVXkr8N+UYhR3HMBK3RMeO

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks