2017-11-01 - HANCITOR MALSPAM (FAKE RINGCENTRAL FAX)

ASSOCIATED FILES:

  • 2017-11-01-Hancitor-malspam-traffic-example.pcap   (444,600 bytes)
  • 2017-11-01-Hancitor-maldoc-fax_953654.doc   (219,648 bytes)
  • 2017-11-01-Hancitor-malspam-all-emails.txt   (32,613 bytes)
  • 2017-11-01-Zeus-Panda-Banker.exe   (186,368 bytes)

 

TODAY'S TWEETS COVERING THE 2017-11-01 WAVE OF #HANCITOR MALSPAM:

 

NOTES:


Shown above:  My tribute to the fallen.

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

LINKS IN THE EMAILS TO THE WORD DOCUMENT:

NAME FOR THE MALICIOUS WORD DOCUMENT:

POST-INFECTION TRAFFIC FROM MY INFECTED HOST:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE RETRIEVED FROM THE INFECTED HOST:

 

FINAL NOTES

Once again, here are the associated files:

Zip archives are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.