2021-06-01 (TUESDAY) - HANCITOR WITH COBALT STRIKE AND NETPING TOOL ACTIVITY
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2021-06-01-Hancitor-IOCs.txt.zip 4.1 kB (4,136 bytes)
- 2021-06-01-Hancitor-malspam-21-examples.zip 53.2 kB (53,192 bytes)
- 2021-06-01-Hancitor-with-Cobalt-Stike-and-netping-tool.pcap.zip 7.6 MB (7,578,021 bytes)
- 2021-06-01-Hancitor-and-Cobalt-Strike-malware.zip 3.8 MB (3,755,266 bytes)
NOTES:
- Reference: Hancitor's Use of Cobalt Strike and a Noisy Network Ping Tool
- Reference: Wireshark Tutorial: Examining Traffic from Hancitor Infections
IMAGES
Shown above: Traffic from the infection filtered in Wireshark - part 1 of 3: going to a Google docs link from one of the emails.
Shown above: Traffic from the infection filtered in Wireshark - part 2 of 3: Hancitor and Cobalt Strike activity starts.
Shown above: Traffic from the infection filtered in Wireshark - part 3 of 3: netping tool activity starts.
Click here to return to the main page.