2017-04-05 - HANCITOR MALSPAM - SUBJECT: MARCH INVOICE # 1234567 DUE

ASSOCIATED FILES:

  • 2017-04-05-Hancitor-malspam-traffic.pcap   (14,582,657 bytes)
  • 2017-04-05-Hancitor-malspam-1512-UTC.eml   (763 bytes)
  • 2017-04-05-Hancitor-malspam-1526-UTC.eml   (737 bytes)
  • 2017-04-05-Hancitor-malspam-1733-UTC.eml   (789 bytes)
  • BN4E.tmp   (165,888 bytes)
  • d657.exe   (156,672 bytes)
  • March_invoice_nathaniel.clark.js   (33,004 bytes)

NOTES:

 

EMAIL


Shown above:  Screen shot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious .js file from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUEST FOR THE .JS FILE:

 

POST-INFECTION TRAFFIC:

 

FILE HASHES

.JS FILE FROM LINK IN THE EMAIL:

MALWARE FROM THE INFECTED HOST:

 

FINAL NOTES

Once again, here are the associated files:

ZIP files are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.