2017-04-04 - HANCITOR MALSPAM - SUBJECT: YOUR MONTHLY BILL 123456 IS AVAILABLE!

ASSOCIATED FILES:

  • 2017-04-04-Hancitor-malspam-traffic.pcap   (15,048,404 bytes)
  • 2017-04-04-Hancitor-malspam-1534-UTC.eml   (1,471 bytes)
  • 2017-04-04-Hancitor-malspam-1536-UTC.eml   (1,471 bytes)
  • 2017-04-04-Hancitor-malspam-1646-UTC.eml   (1,472 bytes)
  • 41592.exe   (121,344 bytes)
  • ADP_invoice_alexander.dixon.doc   (221,696 bytes)
  • BN40D7.tmp   (170,496 bytes)

NOTES:

 

EMAIL


Shown above:  Screen shot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUEST FOR THE INITIAL DOCUMENT:

 

POST-INFECTION TRAFFIC:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE FROM THE INFECTED HOST:

 

IMAGES


Shown above:  Some alerts on the traffic from the Emerging Threats Pro (ETPRO) ruleset using Sguil on Security Onion.

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.