2018-02-20 - HANCITOR INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Zip archive of the traffic: 2018-02-20-Hancitor-infection-with-Zeus-Panda-Banker.pcap.zip 1.9 MB (1,895,268 bytes)
 
- 2018-02-20-Hancitor-infection-with-Zeus-Panda-Banker.pcap (2,173,787 bytes)
 
- Zip archive of the emails: 2018-02-20-Hancitor-malspam-30-examples.txt.zip 2.8 kB (2,763 bytes)
 
- 2018-02-20-Hancitor-malspam-30-examples.txt (30,105 bytes)
 
- Zip archive of the malware: 2018-02-20-malware-from-Hancitor-infection.zip 433.1 kB (433,127 bytes)
 
- 2018-02-20-Hancitor-binary.exe (61,440 bytes)
 - 2018-02-20-Hancitor-downloader-invoice_311706.js (35,396 bytes)
 - 2018-02-20-Hancitor-maldoc-invoice_143264.doc (346,624 bytes)
 - 2018-02-20-Zeus-Panda-Banker.exe (169,984 bytes)
 
NOTES:
- Links from the malspam with /adp.php in the URL returned JavaScript (.js) files.
 - Links from the malspam without /adp.php in the URL returned a Word document.
 - The .js files downloaded Hancitor as a binary.
 - The Word documents had a malicious macro that contained the Hancitor malware.
 - As usual, we saw 3 follow-up downloads for Pony, Evil Pony, and Zeus Panda Banker.
 - As usual, Pony and Evil Pony were resident in the infected host's memory, while Zeus Panda Banker was stored to disk.
 
Shown above: Flowchart for today's Hancitor infection traffic.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- beasecurityguard[.]com
 - brelicensewithus[.]com
 - foodhandlerlicense[.]com
 - getabrelicense[.]com
 - getyourbrelicense[.]com
 - premierrealestateschools[.]info
 - premierrealestateschools[.]org
 - realestatelicense[.]la
 - realestateschools[.]training
 - realestatesschools[.]academy
 - securityguardschooling[.]com
 - rymoonthen[.]com
 - hxxp[:]//uttamah[.]com/wp-content/plugins/pretty-link/includes/1
 - hxxp[:]//uttamah[.]com/wp-content/plugins/pretty-link/includes/2
 - hxxp[:]//uttamah[.]com/wp-content/plugins/pretty-link/includes/3
 - lyhemsasit[.]ru
 
EMAILS

Shown above:  Screenshot from one of the emails with link to a .js file.

Shown above:  Downloading a .js file from one of the emails.

Shown above:  Screenshot from one of the emails with link to a Word document.

Shown above:  Downloading a Word document from one of the emails.
EMAIL HEADERS:
- Date/Time: Tuesday 2018-02-20 as early as 15:47 through at least 20:12 UTC
 - From (spoofed): "ADP, LLC" <un.payroll.invoice@apdm[.]com>
 
- Received: from ([75.144.249[.]209])
 - Received: from ([76.237.148[.]143])
 - Received: from apdm[.]com ([12.118.41[.]74])
 - Received: from apdm[.]com ([24.18.144[.]193])
 - Received: from apdm[.]com ([24.213.39[.]82])
 - Received: from apdm[.]com ([47.190.13[.]102])
 - Received: from apdm[.]com ([50.75.129[.]98])
 - Received: from apdm[.]com ([50.77.19[.]245])
 - Received: from apdm[.]com ([50.248.80[.]249])
 - Received: from apdm[.]com ([64.31.248[.]50])
 - Received: from apdm[.]com ([64.183.12[.]86])
 - Received: from apdm[.]com ([65.153.153[.]118])
 - Received: from apdm[.]com ([69.4.50[.]182])
 - Received: from apdm[.]com ([70.91.150[.]67])
 - Received: from apdm[.]com ([71.15.218[.]215])
 - Received: from apdm[.]com ([72.76.45[.]178])
 - Received: from apdm[.]com ([75.146.239[.]186])
 - Received: from apdm[.]com ([117.240.183[.]117])
 - Received: from apdm[.]com ([173.186.35[.]186])
 - Received: from apdm[.]com ([173.209.154[.]162])
 - Received: from apdm[.]com ([173.235.8[.]204])
 - Received: from apdm[.]com ([185.99.139[.]214])
 - Received: from apdm[.]com ([207.194.39[.]194])
 - Received: from apdm[.]com ([208.67.102[.]180])
 - Received: from apdm[.]com ([209.118.33[.]114])
 - Received: from apdm[.]com ([216.7.131[.]82])
 - Received: from apdm[.]com ([216.82.193[.]52])
 - Received: from apdm[.]com ([216.218.189[.]211])
 - Received: from apdm[.]com ([217.155.10[.]198])
 - Received: from apdm[.]com ([218.197.8[.]26])
 
- Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 047165040
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 062383653
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 068118517
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 068385525
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 081870747
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 206611543
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 224331466
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 265360856
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 273258344
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 278020070
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 281036532
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 282152613
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 285474521
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 324623486
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 344321326
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 352164242
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 370563263
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 381310557
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 414713572
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 451315017
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 526237504
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 546271588
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 567075811
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 582484510
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 660404721
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 665524514
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 745258322
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 822521504
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 834775063
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 841467436
 - Subject: ADP Payroll Invoice for week ending 02/16/2018 - 01728. Invoice: 861551581
 
TRAFFIC

Shown above:  Traffic from an .js-based Hancitor infection filtered in Wireshark.
LINKS IN THE EMAILS TO THE WORD DOCUMENT:
- hxxp[:]//beasecurityguard[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//brelicensewithus[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//brelicensewithus[.]com/adp.php?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//foodhandlerlicense[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//getabrelicense[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//getabrelicense[.]com/adp.php?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//getyourbrelicense[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//premierrealestateschools[.]info?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//premierrealestateschools[.]org?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//realestatelicense[.]la?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//realestateschools[.]training?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//realestatesschools[.]academy?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//realestatesschools[.]academy/adp.php?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//securityguardschooling[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//securityguardschooling[.]com/adp.php?[string of characters]=[encoded string representing recipient's email address]
 
NETWORK TRAFFIC FROM MY INFECTED LAB HOST (.JS-BASED INFECTION):
- 92.53.78[.]188 port 80 - securityguardschooling[.]com - GET /adp.php?[string of characters]=[encoded string representing recipient's email address]
 - 92.53.78[.]188 port 80 - getyourbrelicense[.]com - GET /1.exe
 - api.ipify[.]org - GET /
 - 37.230.228[.]150 port 80 - rymoonthen[.]com - POST /ls5/forum.php
 - 37.230.228[.]150 port 80 - rymoonthen[.]com - POST /mlu/forum.php
 - 37.230.228[.]150 port 80 - rymoonthen[.]com - POST /d2/about.php
 - 192.254.232[.]169 port 80 - uttamah[.]com - GET /wp-content/plugins/pretty-link/includes/1
 - 192.254.232[.]169 port 80 - uttamah[.]com - GET /wp-content/plugins/pretty-link/includes/2
 - 192.254.232[.]169 port 80 - uttamah[.]com - GET /wp-content/plugins/pretty-link/includes/3
 - 185.48.239[.]33 port 443 - lyhemsasit[.]ru - HTTPS/SSL/TLS traffic caused by Zeus Panda Banker
 - www.google[.]com - HTTPS traffic, probably a connectivity check by infected Windows host
 
FILE HASHES
MALWARE RETRIEVED FROM MY INFECTED HOSTS:
- SHA256 hash:  575f6764cc8041a1e7e22db8ed2db0eaa0a47989f6bfd26e63d867caa632225c
File size: 346,624 bytes
File name: invoice_143264.doc [any six random digits for the numbers]
File description: Word document with macro for Hancitor 
- SHA256 hash:  56705514e3a93b7eb8a5555120eeb3f8b9b8e8a509dd0db2e7866dafcebb806a
File size: 35,396 bytes
File name: invoice_311706.js.doc [any six random digits for the numbers]
File description: JavaScript (.js) file to download and run Hancitor binary 
- SHA256 hash:  27a7605e5246074d4eb119785d12d21d98833859f2623d95d56f3b3d9d6c1f37
File size: 61,440 bytes
File location: hxxp[:]//getyourbrelicense[.]com/1.exe
File location: C:\Users\[username]\WinHost32.exe
File description: Hancitor binary retreived by the .js file 
- SHA256 hash:  f8d02d9c20b45e4b558080e332beb710719151533b30c25cc53984d88ccc6769
File size: 169,984 bytes
File location: C:\Users\[username]\AppData\Local\[existing directory path]\[random name].exe
File description: Zeus Panda Banker 
IMAGES

Shown above:  Malware persistent on the infected Windows host through the Windows Registry.
Click here to return to the main page.

