2017-05-09 - HANCITOR MALSPAM - SUBJECT: RE: MAY SUBPOENA FROM FTC

ASSOCIATED FILES:

  • 2017-05-09-Hancitor-malspam-traffic.pcap   (7,938,967 bytes)
  • 2017-05-09-Hancitor-malspam-1637-UTC.eml   (1,913 bytes)
  • 2017-05-09-Hancitor-malspam-1728-UTC.eml   (1,915 bytes)
  • BNB3B4.tmp   (194,048 bytes)
  • scanned_subpoena_blake.reginald.doc   (224,768 bytes)

 

NOTES:

EMAIL


Shown above:  Screen shot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUEST FOR THE WORD DOCUMENT:

NAMES FOR THE MALICIOUS WORD DOCUMENTS:

 

POST-INFECTION TRAFFIC FROM MY ONE INFECTED HOST:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE FROM THE INFECTED HOST:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.