General

  • Target

    c6a955feba1b9e85859176043a1a274c

  • Size

    539KB

  • Sample

    240313-xxsrgafd43

  • MD5

    c6a955feba1b9e85859176043a1a274c

  • SHA1

    31e397116cb4a2ec8188f9b51c0b980389031689

  • SHA256

    25b1a6b2d713499b4d483d782626ff8f8622bfa1b078a6641d2efbe615db1ffd

  • SHA512

    8c06e70f6b85011f82ef45fc9f605722b4a6037aea8340482dbafd68bbd647a69fbd028fbb9cbf69f7b4250de65013cb76a8c082af746b67f7d68d47a56451bf

  • SSDEEP

    12288:hV9iQsDr8NQhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5/U:hVXkr8NpNrAmqL/EnJ1BsrPzhN5M

Malware Config

Extracted

Family

hancitor

Botnet

0308_spnv5

C2

http://priekornat.com/8/forum.php

http://stionsomi.ru/8/forum.php

http://arviskeist.ru/8/forum.php

Targets

    • Target

      c6a955feba1b9e85859176043a1a274c

    • Size

      539KB

    • MD5

      c6a955feba1b9e85859176043a1a274c

    • SHA1

      31e397116cb4a2ec8188f9b51c0b980389031689

    • SHA256

      25b1a6b2d713499b4d483d782626ff8f8622bfa1b078a6641d2efbe615db1ffd

    • SHA512

      8c06e70f6b85011f82ef45fc9f605722b4a6037aea8340482dbafd68bbd647a69fbd028fbb9cbf69f7b4250de65013cb76a8c082af746b67f7d68d47a56451bf

    • SSDEEP

      12288:hV9iQsDr8NQhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5/U:hVXkr8NpNrAmqL/EnJ1BsrPzhN5M

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks