General

  • Target

    afdabb0054f015084c55a446118e3473_JaffaCakes118

  • Size

    365KB

  • Sample

    240820-tcdj9s1ake

  • MD5

    afdabb0054f015084c55a446118e3473

  • SHA1

    990487f1398d3fe950e38d20ca3f5d271ac7abf9

  • SHA256

    7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba

  • SHA512

    017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e

  • SSDEEP

    6144:sicARoup4jV7w0ba0lIvaRNlVA9I0R/kSp42WCzTf2kCUyBdLNgKsDesUBaKsYQc:0A2up4jV7Za0qvaRnKvxP4hiTf2k2b3J

Malware Config

Extracted

Family

hancitor

Botnet

0402_pogi

C2

http://feirecropl.com/8/forum.php

http://oresteseu.ru/8/forum.php

http://respoishis.ru/8/forum.php

Targets

    • Target

      afdabb0054f015084c55a446118e3473_JaffaCakes118

    • Size

      365KB

    • MD5

      afdabb0054f015084c55a446118e3473

    • SHA1

      990487f1398d3fe950e38d20ca3f5d271ac7abf9

    • SHA256

      7cf248bdae62a6ff5bbc41566eba5c85b3eaf6f5b22cdf46e56d2cb63a69ccba

    • SHA512

      017d5efb60342835c17b563a8499b13f5f4eb1232db33acd31caa076e31f62539867765891ccd88503a1bc2727c36b4a5fcf7d33242096b656182878982b097e

    • SSDEEP

      6144:sicARoup4jV7w0ba0lIvaRNlVA9I0R/kSp42WCzTf2kCUyBdLNgKsDesUBaKsYQc:0A2up4jV7Za0qvaRnKvxP4hiTf2k2b3J

    • Hancitor

      Hancitor is downloader used to deliver other malware families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks