2017-04-04 - HANCITOR INFECTION WITH ZLOADER

NOTICE:

ASSOCIATED FILES:

  • 22017-04-04-Hancitor-infection-with-ZLoader.pcap   (15,048,404 bytes)
  • 2017-04-04-Hancitor-malspam-1534-UTC.eml   (1,471 bytes)
  • 2017-04-04-Hancitor-malspam-1536-UTC.eml   (1,471 bytes)
  • 2017-04-04-Hancitor-malspam-1646-UTC.eml   (1,472 bytes)
  • 41592.exe   (121,344 bytes)
  • ADP_invoice_alexander.dixon.doc   (221,696 bytes)
  • BN40D7.tmp   (170,496 bytes)

 

EMAIL


Shown above:  Screen shot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUEST FOR THE INITIAL DOCUMENT:

 

POST-INFECTION TRAFFIC:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE FROM THE INFECTED HOST:

 

IMAGES


Shown above:  Some alerts on the traffic from the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion.

 

Click here to return to the main page.