2019-01-22 - HANCITOR MALSPAM WITH FEDEX THEME

NOTICE:

ASSOCIATED FILES:

  • 2019-01-22-Hancitor-malspam-10-email-examples.txt   (97,493 bytes)
  • 2019-01-22-Hancitor-infection-with-Ursnif.pcap   (1,012,759 bytes)
  • 2019-01-22-downloaded-Excel-spreadsheet-with-macro-for-Hancitor.xls   (468,992 bytes)
  • 2019-01-22-Hancitor-dropped-by-Excel-macro.exe   (77,312 bytes)
  • 2019-01-22-Ursnif-retreived-by-Hancitor-infected-host.exe   (153,600 bytes)

NOTES:

 


Shown above:  Flow chart for recent Hancitor malspam infections.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

MALSPAM DATA


Shown above:  Screenshot from one of the emails.

 

DATA FROM 10 EMAIL EXAMPLES:

 


Shown above:  Malicious Word document downloaded from link in the malspam.

 

TRAFFIC

LINKS IN THE EMAILS TO DOWNLOAD THE WORD DOCUMENT:

 


Shown above:  HTTP traffic from today's infection filtered in Wireshark.

 

INITIAL HANCITOR INFECTION TRAFFIC:

URSNIF POST-INFECTION HTTP TRAFFIC:

URSNIF POST-INFECTION DNS TRAFFIC:

 

FILE HASHES

MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:

 

Click here to return to the main page.