2017-05-10 - HANCITOR INFECTION WITH ZLOADER

NOTICE:

ASSOCIATED FILES:

  • 2017-05-10-Hancitor-infection-with-ZLoader.pcap   (13,413,872 bytes)
  • 2017-05-10-Hancitor-malspam-1435-UTC.eml   (800 bytes)
  • 2017-05-10-Hancitor-malspam-1456-UTC.eml   (156,66 bytes)
  • 2017-05-10-Hancitor-malspam-1457-UTC.eml   (769 bytes)
  • WEXInc_subpoena_Reggie.Standsford.doc   (160,256 bytes)

 

EMAIL


Shown above:  Screen shot from one of the fake Comcast emails.

 


Shown above:  Screen shot from one of the fake subpoena emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUESTS FOR THE WORD DOCUMENT:

NAME FOR THE MALICIOUS WORD DOCUMENTS:

POST-INFECTION TRAFFIC FROM MY ONE INFECTED HOST:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

 

Click here to return to the main page.