2018-02-28 - HANCITOR MALSPAM - FAKE EFAX MESSAGE

ASSOCIATED FILES:

  • 2018-02-28-Hancitor-infection-traffic-1st-run.pcap   (327,381 bytes)
  • 2018-02-28-Hancitor-infection-traffic-2nd-run.pcap   (309,891 bytes)
  • 2018-02-28-Hancitor-infection-traffic-3rd-run.pcap   (421,314 bytes)
  • 2018-02-28-Hancitor-malspam-20-email-examples.txt   (80,869 bytes)
  • 2018-02-28-Hancitor-maldoc-fax_933254.doc   (240,640 bytes)
  • 2018-02-28-Zeus-Panda-Banker.exe   (188,928 bytes)

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document downloaded from a link in the malspam.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

LINKS IN THE EMAILS TO THE WORD DOCUMENT:

NETWORK TRAFFIC FROM MY INFECTED LAB HOSTS:

 

FILE HASHES

MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:

 

FINAL NOTES

Once again, here are the associated files:

Zip archives are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.