2017-12-06 - HANCITOR MALSPAM - MORE ICEDID BANKING TROJAN (NO ZEUS PANDA BANKER)

ASSOCIATED FILES:

  • 2017-12-06-Hancitor-malspam-traffic.pcap   (1,934,709 bytes)
  • 2017-12-06-Hancitor-malspam-30-emails.txt   (34,526 bytes)
  • 2017-12-06-Hancitor-maldoc-invoice_491457.doc   (214,528 bytes)
  • 2017-12-06-IcedID-banking-Trojan-theatctaa.exe   (903,168 bytes)
  • 2017-12-06-binary-from-nobleduty.com.exe   (825,856 bytes)

 

NOTES:

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 


Shown above:  Some alerts from Sguil in Security Onion using Suricata and the EmergingThreats Pro ruleset.

 

LINKS IN THE EMAILS TO THE WORD DOCUMENT:

NETWORK TRAFFIC FROM MY INFECTED LAB HOST:

 

FILE HASHES

MALWARE RETRIEVED FROM THE INFECTED HOST:

 

IMAGES


Shown above:  IceID banking Trojan persistent on the infected Windows host.

 

FINAL NOTES

Once again, here are the associated files:

Zip archives are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.