2018-04-19 - HANCITOR INFECTION WITH ZEUS PANDA BANKER

NOTICE:

ASSOCIATED FILES:

  • 2018-04-19-Hancitor-infection-with-Zeus-Panda-Banker.pcap   (5,194,979 bytes)
  • 2018-04-19-Hancitor-malspam-54-examples.txt   (333,283 bytes)
  • 2018-04-19-Hancitor-infection-follow-up-malware-81a.exe   (1,892,352 bytes)
  • 2018-04-19-Word-doc-with-macro-for-Hancitor.doc   (265,216 bytes)
  • 2018-04-19-Zeus-Panda-Banker-seen-during-Hancitor-malspam-infection.exe   (204,800 bytes)

NOTES:


Shown above:  Flow chart for a typical Hancitor infection.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document downloaded from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 


Shown above:  Traffic from the infected host for SSE spambot UDP beacon.

 

LINKS IN THE EMAILS TO DOWNLOAD THE WORD DOCUMENT:

NETWORK TRAFFIC FROM AN INFECTED LAB HOST:

 

FILE HASHES

MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:


Shown above:  Zeus Panda Banker persistent on the infected Windows host.

 

Click here to return to the main page.