2021-09-02 (THURSDAY) - HANCITOR (CHANITOR/MAN1/MOSKALVZAPOE/TA511) WITH COBALT STRIKE (BEACON)
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2021-09-02-Hancitor-with-Cobalt-Strike-IOCs.txt.zip 5.8 kB (5,843 bytes)
- 2021-09-02-Hancitor-malspam-52-examples.zip 128 kB (128,382 bytes)
- 2021-09-02-Hancitor-with-Cobalt-Strike.pcap.zip 5.6 MB (5,556,815 bytes)
- 2021-09-02-Hancitor-malware-and-artifacts.zip 3.6 MB (3,588,817 bytes)
Shown above: Screenshot from a Hancitor email on Thursday 2021-09-02.
Shown above: Clicking the Google Feedproxy link redirects to another malicious link that provides a Word document.
Shown above: The browser redirects to DocuSign site after the Word document is presented for Download.
Shown above: Screenshot of the downloaded Word document.
Shown above: Enabling macros causes another Word document to briefly pop up named glib.doc.
Shown above: Location of glib.doc and Hancitor DLL.
Shown above: Traffic from the infection filtered in Wireshark.
Click here to return to the main page.