General

  • Target

    912d4577fff64d062e613da735f17991

  • Size

    451KB

  • Sample

    240205-gaxh5sdgdj

  • MD5

    912d4577fff64d062e613da735f17991

  • SHA1

    1dea29b7e9639ced1f5713b77a53d063c44dffc2

  • SHA256

    d387bb7970545808dc199de51b482ccb4faf5e8e1df678bc9116a81d51b0bc32

  • SHA512

    df116217c51add87a8b861c912ff47f05af35b38740e152796f0435f1ff563cb2b79e39a8c18a830ea35d21a839420443e661df24d1ed499aef4d2cc5ce2cdf6

  • SSDEEP

    6144:WqVCgeFRmJMYjTkRFr8NWJIfXzigjcmPYeKfhi3aS1vJO4OzBtYOlV7J4MtAKY0/:zV9iQsDr8NXrLTQr0aCwSYRY038TW

Malware Config

Extracted

Family

hancitor

Botnet

2508_bqplf

C2

http://intakinger.com/8/forum.php

http://idgentexpliet.ru/8/forum.php

http://declassivan.ru/8/forum.php

Targets

    • Target

      912d4577fff64d062e613da735f17991

    • Size

      451KB

    • MD5

      912d4577fff64d062e613da735f17991

    • SHA1

      1dea29b7e9639ced1f5713b77a53d063c44dffc2

    • SHA256

      d387bb7970545808dc199de51b482ccb4faf5e8e1df678bc9116a81d51b0bc32

    • SHA512

      df116217c51add87a8b861c912ff47f05af35b38740e152796f0435f1ff563cb2b79e39a8c18a830ea35d21a839420443e661df24d1ed499aef4d2cc5ce2cdf6

    • SSDEEP

      6144:WqVCgeFRmJMYjTkRFr8NWJIfXzigjcmPYeKfhi3aS1vJO4OzBtYOlV7J4MtAKY0/:zV9iQsDr8NXrLTQr0aCwSYRY038TW

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks