2017-02-06 - HANCITOR/PONY MALSPAM - SUBJECT: SHIPPING INFORMATION FOR PARCEL 570754521
ASSOCIATED FILES:
- ZIP archive of the pcap: 2017-02-06-Hancitor-Pony-malspam-traffic.pcap.zip 8.4 MB (8,377,232 bytes)
- 2017-02-06-Hancitor-Pony-malspam-traffic.pcap (9,171,958 bytes)
- ZIP archive of the emails and recovered malware: 2017-02-06-Hancitor-Pony-malspam-and-malware.zip 328 kB (327,921 bytes)
- 2017-02-06-Hancitor-Pony-malspam-1550-UTC.eml (1,880 bytes)
- 2017-02-06-Terdot.A-Zloader-from-Hancitor-malspam.exe (296,448 bytes)
- USPS_invoice_reggie.cage.doc (204,288 bytes)
NOTES:
- More malspam similar to an ISC diary I wrote covering Hancitor/Pony/Vawtrak malspam on 2017-01-10 (link), but today it's Zloader instead of Vawtrak.
- Today's email was disguised as a USPS parcel notification.
Shown above: Flowchart for this infection traffic.
Shown above: Screenshot from one of the emails.
EMAIL HEADERS:
- Date: Monday 2017-02-06 at 15:50 UTC
- From (spoofed): "USPS" <shipping@usps-service.com>
- Subject: Shipping information for parcel 570754521
- Message-ID: <5D2F5530.4C8BB703@usps-service.com>
Shown above: Word document downloaded from link in the email.
TRAFFIC
Shown above: Traffic from the infection filtered in Wireshark.
ASSOCIATED DOMAINS:
- 157.7.188.126 port 80 - margo.co.jp - GET /api/get.php?id=[base64 characters representing recipient's email address]
- api.ipify.org - GET / [IP address check by the infected host]
- 46.30.45.20 port 80 - hitorsletna.com - POST /ls5/forum.php [Hancitor check-in]
- 185.111.232.42 port 80 - istanbulescortvip.net - /wp-content/themes/sketch/1 [Download Pony DLL]
- 46.30.45.20 port 80 - hitorsletna.com - POST /klu/forum.php
- 185.111.232.42 port 80 - istanbulescortvip.net - GET /wp-content/themes/sketch/a1 [follow-up download]
- 178.208.77.233 port 80 - herstihenone.com - POST /bdk/gate.php
- checkip.dyndns.org - GET / [IP address check by the infected host]
FILE HASHES
WORD DOCUMENT:
- SHA256 hash: e3f26b8c434e47984ca81cc80e8b9c734b70708d7a5bcaf9e839292e4ccd4298 (204,288 bytes)
File description: Hancitor maldoc (Word document) on 2017-02-06
TERDOT.A/ZLOADER:
- SHA256 hash: 3af7cdf36d1542a2723487f40b58f735e03058a4e28010861070cf9a8151b261 (296,448 bytes)
File description: Terdot.A/Zloader on 2017-02-06
FINAL NOTES
Once again, here are the associated files:
- ZIP archive of the pcap: 2017-02-06-Hancitor-Pony-malspam-traffic.pcap.zip 8.4 MB (8,377,232 bytes)
- ZIP archive of the emails and recovered malware: 2017-02-06-Hancitor-Pony-malspam-and-malware.zip 328 kB (327,921 bytes)
ZIP files are password-protected with the standard password. If you don't know it, look at the "about" page of this website.
Click here to return to the main page.