2021-09-02 (THURSDAY) - HANCITOR (CHANITOR/MAN1/MOSKALVZAPOE/TA511) WITH COBALT STRIKE (BEACON)
ASSOCIATED FILES:
- 2021-09-02-Hancitor-with-Cobalt-Strike-IOCs.txt.zip 5.8 kB (5,843 bytes)
- 2021-09-02-Hancitor-malspam-52-examples.zip 124 kB (124,014 bytes)
- 2021-09-02-Hancitor-with-Cobalt-Strike.pcap.zip 5.6 MB (5,556,815 bytes)
- 2021-09-02-Hancitor-malware-and-artifacts.zip 3.6 MB (3,587,765 bytes)
NOTES:
- All zip archives on this site are password-protected. If you don't know the password, see the "about" page of this website.
Shown above: Screenshot from a Hancitor email on Thursday 2021-09-02.
Shown above: Clicking the Google Feedproxy link redirects to another malicious link that provides a Word document.
Shown above: The browser redirects to DocuSign site after the Word document is presented for Download.
Shown above: Screenshot of the downloaded Word document.
Shown above: Enabling macros causes another Word document to briefly pop up named glib.doc.
Shown above: Location of glib.doc and Hancitor DLL.
Shown above: Traffic from the infection filtered in Wireshark.
Click here to return to the main page.