2017-06-07 - HANCITOR INFECTION WTIH ZLOADER

NOTICE:

ASSOCIATED FILES:

  • 2017-06-07-Hancitor-infection-with-ZLoader.pcap   (9,005,351 bytes)
  • 2017-06-07-Hancitor-malspam-1430-UTC.eml   (3,302 bytes)
  • 2017-06-07-Hancitor-malspam-1447-UTC.eml   (3,293 bytes)
  • 2017-06-07-Hancitor-malspam-1513-UTC.eml   (3,300 bytes)
  • BN778F.tmp   (197,120 bytes)
  • Document_yahoo.doc   (203,776 bytes)

 

SOME TWITTER ACCOUNTS THAT TWEETED ABOUT TODAY'S #HANCITOR ACTIVITY:

 

EMAILS


Shown above:  Screen shot from one of the emails.

 

EMAIL HEADERS:

 


Shown above:  Malicious Word document from link in the malspam.

 

TRAFFIC


Shown above:  Traffic from the infection filtered in Wireshark.

 

HTTP REQUESTS FOR THE WORD DOCUMENT:

NAME FOR THE MALICIOUS WORD DOCUMENTS:

POST-INFECTION TRAFFIC FROM MY ONE INFECTED HOST:

 

FILE HASHES

WORD DOCUMENT FROM LINK IN THE EMAIL:

MALWARE RETRIEVED FROM THE INFECTED HOST:

 

Click here to return to the main page.