2017-06-15 - HANCITOR MALSPAM (GOOGLE DOCS-THEMED)

ASSOCIATED FILES:

  • 2017-06-15-Hancitor-malspam-traffic.pcap   (9,577,473 bytes)
  • 2017-06-15-Hancitor-malspam-1614-UTC.eml   (2,982 bytes)
  • 2017-06-15-Hancitor-malspam-1638-UTC.eml   (2,965 bytes)
  • 2017-06-15-Hancitor-malspam-1702-UTC.eml   (2,977 bytes)
  • 2017-06-15-Hancitor-malspam-1711-UTC.eml   (2,969 bytes)
  • 2017-06-15-Hancitor-malspam-1714-UTC.eml   (2,969 bytes)
  • 2017-06-15-Hancitor-malspam-1732-UTC.eml   (2,967 bytes)
  • 2017-06-15-Hancitor-malspam-1738-UTC.eml   (2,968 bytes)
  • 2017-06-15-Hancitor-malspam-1850-UTC.eml   (2,968 bytes)
  • 2017-06-15-Hancitor-malspam-1920-UTC.eml   (2,964 bytes)
  • BN8BAB.tmp   (182,784 bytes)
  • Document_yahoo.doc   (221,696 bytes)

 

SOME TWEETS ABOUT TODAY'S #HANCITOR MALSPAM:

OTHER NOTES:

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUESTS FOR THE WORD DOCUMENT:

NAME FOR THE MALICIOUS WORD DOCUMENTS:

POST-INFECTION TRAFFIC FROM MY ONE INFECTED HOST:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE RETRIEVED FROM THE INFECTED HOST:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.