2020-10-20 - HANCITOR WITH SOMETHING AND COBALT STRIKE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2020-10-20-Hancitor-IOCs.txt.zip 2.6 kB (2,574 bytes)
- 2020-10-20-Hancitor-malspam-9-examples.zip 19.9 kB (19,914 bytes)
- 2020-10-20-Hancitor-infection-traffic.pcap.zip 4.4 MB (4,444,385 bytes)
- 2020-10-20-Hancitor-and-follow-up-malware.zip 760 kB (760,319 bytes)
IMAGES
Shown above: Screen shot from an example of malspam pushing Hancitor.
Shown above: Screenshot from one of the Google Docs pages leading to the spreadsheet.
Shown above: Screenshot from one of the Excel files downloaded through the Google Docs pages.
Shown above: Traffic from an infection filtered in Wireshark.
Shown above: The initial Hancitor EXE.
Shown above: Registry update to make the Hancitor EXE persistent.
Shown above: Malware binaries in the infected user's AppData\Local\Temp directory.
Shown above: This appeared after the Cobalt Strike activity started.
Click here to return to the main page.