2018-07-09 - HANCITOR INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2018-07-09-Hancitor-malspam-1506-UTC.eml.zip 2.0 kB (2,040 bytes)
- 2018-07-09-Hancitor-malspam-1506-UTC.eml (6.048 bytes)
- 2018-07-09-Hancitor-infection-with-Zeus-Panda-Banker.pcap.zip 2.4 MB (2,358,376 bytes)
- 2018-07-09-Hancitor-infection-with-Zeus-Panda-Banker.pcap (2,963,326 bytes)/li>
- 2018-07-09-malware-from-Hancitor-infection.zip 271 kB (270,874 bytes)
- 2018-07-09-Hancitor-binary-6C.pif.exe (56,320 bytes)
- 2018-07-09-Zeus-Panda-Banker-caused-by-Hancitor-infection.exe (172,544 bytes)
- 2018-07-09-downloaded-Word-doc-with-macro-for-Hancitor.doc (181,760 bytes)
NOTES:
- As always, thanks to @Techhelplist, @James_inthe_box, and the many others who keep a close eye on this. Their info helps make my blog posts more complete.
- And thanks to everyone who contributed to the discussion thread on Twitter when I was having problems downloading the initial Word document.
Shown above: Flow chart for today's Hancitor malspam infection.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domain and URLs:
- altilium[.]com
- altilium[.]net
- dryerventwizardcanada[.]biz
- getlintout[.]biz
- getthelintout[.]info
- pbtmail[.]com
- pbtmail[.]net
- thedryerventwizard[.]biz
- thedryerventwizard[.]ca
- wegetthelintout[.]ca
- wegetthelintout[.]net
- hinwasslysed[.]com
- harforusero[.]ru
- berofaked[.]ru
- hxxp[:]//realeverydaybusiness[.]com/wp-content/plugins/jetpack-popular-posts/1
- hxxp[:]//realeverydaybusiness[.]com/wp-content/plugins/jetpack-popular-posts/2
- hxxp[:]//realeverydaybusiness[.]com/wp-content/plugins/jetpack-popular-posts/3
- hxxp[:]//ourfamilyhome[.]biz/wp-content/plugins/formget-contact-form/inc/1
- hxxp[:]//ourfamilyhome[.]biz/wp-content/plugins/formget-contact-form/inc/2
- hxxp[:]//ourfamilyhome[.]biz/wp-content/plugins/formget-contact-form/inc/3
- hxxp[:]//scientificservicesinc[.]com/wp-content/plugins/themestarta/1
- hxxp[:]//scientificservicesinc[.]com/wp-content/plugins/themestarta/2
- hxxp[:]//scientificservicesinc[.]com/wp-content/plugins/themestarta/3
- hxxp[:]//psychprofiler[.]com/wp-content/plugins/limit-login-attempts/1
- hxxp[:]//psychprofiler[.]com/wp-content/plugins/limit-login-attempts/2
- hxxp[:]//psychprofiler[.]com/wp-content/plugins/limit-login-attempts/3
- hxxp[:]//thewordspoken[.]org/wp-content/plugins/backupwordpress/1
- hxxp[:]//thewordspoken[.]org/wp-content/plugins/backupwordpress/2
- hxxp[:]//thewordspoken[.]org/wp-content/plugins/backupwordpress/3
- myaningmuchme[.]ru
EMAILS
Shown above: Example of the malspam.
EMAIL HEADERS FROM TODAY'S HANCITOR MALSPAM EXAMPLE:
Received: from abramscpa[.]com ([173.51.132[.]44]) by [removed] for [removed];
Mon, 09 Jul 2018 15:06:40 +0000 (UTC)
Message-ID: <1C2ED6EA.ACEFB0C6@abramscpa[.]com>
Date: Mon, 09 Jul 2018 08:06:43 -0700
Reply-To: "HelloFax" <hellofax@abramscpa[.]com>
From: "HelloFax Inc." <hellofax@abramscpa[.]com>
X-Mailer: Apple Mail (2.1990.1)
MIME-Version: 1.0
TO: [removed]
Subject: HelloFax, Here is Your Fax
Content-Type: text/html;
charset="utf-8"
Content-Transfer-Encoding: 7bit
Shown above: Word doc downloaded from link in the malspam.
INFECTION TRAFFIC
Shown above: Traffic from an infection filtered in Wireshark.
LINKS IN THE EMAILS TO DOWNLOAD THE MALICIOUS WORD DOCUMENT:
- hxxp[:]//altilium[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//altilium[.]net?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//dryerventwizardcanada[.]biz?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//getlintout[.]biz?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//getthelintout[.]info?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//pbtmail[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//pbtmail[.]net?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//thedryerventwizard[.]biz?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//thedryerventwizard[.]ca?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//wegetthelintout[.]ca?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//wegetthelintout[.]net?[string of characters]=[encoded string representing recipient's email address]
NETWORK TRAFFIC FROM AN INFECTED LAB HOST:
- 95.213.237[.]64 port 80 - getlintout[.]biz - GET /?[string of characters]=[encoded string representing recipient's email address]
- port 80 - api.ipify[.]org - GET /
- 91.227.68[.]173 port 80 - hinwasslysed[.]com - POST /4/forum.php
- 91.227.68[.]173 port 80 - hinwasslysed[.]com - POST /mlu/about.php
- 91.227.68[.]173 port 80 - hinwasslysed[.]com - POST /d2/about.php
- 69.195.124[.]61 port 80 - realeverydaybusiness[.]com - GET /wp-content/plugins/jetpack-popular-posts/1
- 69.195.124[.]61 port 80 - realeverydaybusiness[.]com - GET /wp-content/plugins/jetpack-popular-posts/2
- 69.195.124[.]61 port 80 - realeverydaybusiness[.]com - GET /wp-content/plugins/jetpack-popular-posts/3
- 5.188.232[.]238 port 443 - myaningmuchme[.]ru - HTTPS/SSL/TLS traffic caused by Zeus Panda Banker
- port 80 - www.google[.]com - HTTPS/SSL/TLS traffic - probable connectivity check caused by Zeus Panda Banker
MALWARE
MALWARE RETRIEVED FROM MY INFECTED LAB HOST:
- SHA256 hash: 687582d32b7c7603a334f5e30d5f5a335624a1a19200980ec2951a205a88acb2
File size: 181,760 bytes
File name: fax_[six random digits].doc
File description: Downloaded Word doc with macro for Hancitor
- SHA256 hash: 4ba21629c84a89c6d2d5c52abcd110c551a5f9fe9008c7f0e6b43ecde0cca1f0
File size: 56,320 bytes
File location: C:\Users\[username]\AppData\Local\Temp\6C.pif
File description: Hancitor malware binary
- SHA256 hash: 111b67b802426c2e94e933761cbb6168a6730c99849244e518d11e1474218088
File size: 172,544 bytes
File location: C:\Users\[username]\AppData\Roaming\[existing directory path]\[random name].exe
File description: Zeus Panda banker caused by Hancitor infection
Click here to return to the main page.