2019-01-22 - HANCITOR MALSPAM WITH FEDEX THEME
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- Email examples: 2019-01-22-Hancitor-malspam-10-email-examples.txt.zip 4.2 kB (4,178 bytes)
- 2019-01-22-Hancitor-malspam-10-email-examples.txt (97,493 bytes)
- Traffic: 2019-01-22-Hancitor-infection-with-Ursnif.pcap.zip 740 kB (740,179 bytes)
- 2019-01-22-Hancitor-infection-with-Ursnif.pcap (1,012,759 bytes)
- Malware: 2019-01-22-malware-from-Hancitor-infected-host.zip 457 kB (456,664 bytes)
- 2019-01-22-downloaded-Excel-spreadsheet-with-macro-for-Hancitor.xls (468,992 bytes)
- 2019-01-22-Hancitor-dropped-by-Excel-macro.exe (77,312 bytes)
- 2019-01-22-Ursnif-retreived-by-Hancitor-infected-host.exe (153,600 bytes)
NOTES:
- As always, my thanks to everyone who keeps an eye on this malspam and reports about it near-real-time on Twitter.
- More indicators by @James_inthe_box from today's Hancitor posted at this Pastebin link.
Shown above: Flow chart for recent Hancitor malspam infections.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- fishfinderland[.]com
- gunnegotiator[.]com
- gunnegotiator[.]net
- sjkfishfinders[.]com
- sjkboating[.]com
- sjkfishfinders[.]com
- sjkpools[.]com
- sjkswimming[.]com
- hxxp[:]//rushnewmedia[.]de/wp/wp-content/plugins/really-simple-captcha/1
- hxxp[:]//rushnewmedia[.]de/wp/wp-content/plugins/really-simple-captcha/2
- hxxp[:]//rushnewmedia[.]de/wp/wp-content/plugins/really-simple-captcha/3
- felighevengna[.]com
- g2.ex100p[.]at
- in.termas[.]at
MALSPAM DATA
Shown above: Screenshot from one of the emails.
DATA FROM 10 EMAIL EXAMPLES:
- Date: Tue, 22 Jan 2019 as early as 16:56 UTC through at least 19:59 UTC
- From: "FedEx" <fedex@jackphelan[.]com>
- From: "FedEx Inc." <fedex@jackphelan[.]com>
- Subject: FedEx Tracking
- Subject: Here is Your FedEx Tracking
- Subject: Here is Your FedEx Tracking Number
- Received: from jackphelan[.]com ([12.133.172[.]202])
- Received: from jackphelan[.]com ([12.220.54[.]114])
- Received: from jackphelan[.]com ([50.247.161[.]198])
- Received: from jackphelan[.]com ([65.5.84[.]226])
- Received: from jackphelan[.]com ([72.255.81[.]102])
- Received: from jackphelan[.]com ([74.129.110[.]170])
- Received: from jackphelan[.]com ([80.44.89[.]111])
- Received: from jackphelan[.]com ([97.105.164[.]46])
- Received: from jackphelan[.]com ([207.162.190[.]6])
- Received: from jackphelan[.]com ([207.162.190[.]11])
Shown above: Malicious Word document downloaded from link in the malspam.
TRAFFIC
LINKS IN THE EMAILS TO DOWNLOAD THE WORD DOCUMENT:
- hxxp[:]//fishfinderland[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//gunnegotiator[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//gunnegotiator[.]net?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//sjkfishfinders[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//sjkboating[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//sjkfishfinders[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//sjkpools[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//sjkswimming[.]com?[string of characters]=[encoded string representing recipient's email address]
Shown above: HTTP traffic from today's infection filtered in Wireshark.
INITIAL HANCITOR INFECTION TRAFFIC:
- 47.74.24[.]76 port 80 - sjkboating[.]com - GET /?[string of characters]=[encoded string representing recipient's email address]
- port 80 - api.ipify[.]org - GET /
- 81.171.7[.]39 port 80 - felighevengna[.]com - POST /4/forum.php
- 81.171.7[.]39 port 80 - felighevengna[.]com - POST /mlu/about.php
- 81.171.7[.]39 port 80 - felighevengna[.]com - POST /d2/about.php
- 82.165.41[.]17 port 80 - rushnewmedia[.]de - GET /wp/wp-content/plugins/really-simple-captcha/1
- 82.165.41[.]17 port 80 - rushnewmedia[.]de - GET /wp/wp-content/plugins/really-simple-captcha/2
- 82.165.41[.]17 port 80 - rushnewmedia[.]de - GET /wp/wp-content/plugins/really-simple-captcha/3
URSNIF POST-INFECTION HTTP TRAFFIC:
- 195.213.235[.]125 port 80 - g2.ex100p[.]at - GET /webstore/[long string of characters]
- 192.42.119[.]41 port 80 - in.termas[.]at - GET /webstore/[long string of characters]
URSNIF POST-INFECTION DNS TRAFFIC:
- 192.71.245[.]208 port 53 (UDP) - DNS query for: g2.ex100p[.]at
- 192.71.245[.]208 port 53 (UDP) - DNS query for: beetfeetlife[.]bit
- 192.71.245[.]208 port 53 (UDP) - DNS query for: in.termas[.]at
FILE HASHES
MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:
- SHA256 hash: 76b96c8d796cfcebff34d42e65e5a4ab2770fda42ea3c259097ee068660dfcc2
File size: 468,992 bytes
File name: invoice_392690.xls (random numbers in the file name)
File description: Excel spreadsheet downloaded from link in Hancitor malspam. Has macro to cause Hancitor infection.
- SHA256 hash: d16f1d82ace24ed81113f0ef315e96a2e4d8a28f848e33f59907078b9dd670a9
File size: 77,312 bytes
File location: C:\Users\[username]\AppData\Local\Temp\6fsdFfa.com
File location: C:\Users\[username]\AppData\Local\Temp\6.pif
File description: Hancitor malware EXE seen after enabling macro from downloaded Excel spreadsheet
- SHA256 hash: 4ef443dc917de8b83f54787d666f46aac66defd75d03446678e0900b214e5d2d
File size: 153,600 bytes
File location: C:\Users\[username]AppData\Local\Temp\BN7C9E.tmp (random hex characters in file name)
File description: Ursnif EXE on 2019-01-22 retreived by Hancitor-infected host
Click here to return to the main page.