2018-05-31 - HANCITOR MALSPAM - FAKE HELLOFAX NOTIFICATIONS

ASSOCIATED FILES:

  • 2018-05-31-Hancitor-malspam-infection-traffic.pcap   (708,946 bytes)
  • 2018-05-31-Hancitor-malspam-1618-UTC.eml   (6,157 bytes)
  • 2018-05-31-Word-doc-with-macro-for-Hancitor.doc   (175,104 bytes)
  • 2018-05-31-Zeus-Panda-Banker-caused-by-Hanictor-infection.exe   (203,264 bytes)

NOTES:


Shown above:  Flow chart for a typical Hancitor malspam infection.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following domains and URLs:

 

EMAILS


Shown above:  Screenshot from one of the emails.

 

EMAIL HEADERS:

Received: from whiteroadgraphics.com ([66.51.152.18]) by [removed] for [removed];
        Thu, 31 May 2018 16:18:27 +0000 (UTC)
Message-ID: <977B1E28.53BBE045@whiteroadgraphics.com>
Date: Thu, 31 May 2018 12:18:31 -0400
Reply-To: "HelloFax Inc." <hellofax@whiteroadgraphics.com>
From: "HelloFax Inc." <hellofax@whiteroadgraphics.com>
X-Mailer: Apple Mail (2.1084)
X-Accept-Language: en-us
MIME-Version: 1.0
TO: [removed]
Subject: Welcome to HelloFax, Someone Sent You a Fax

 


Shown above:  Malicious Word document downloaded from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

NETWORK TRAFFIC FROM AN INFECTED LAB HOST:

 

FILE HASHES

MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:

 

FINAL NOTES

Once again, here are the associated files:

Zip archives are password-protected with the standard password.  If you don't know it, look at the "about" page of this website.

Click here to return to the main page.