2018-02-28 - HANCITOR INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- Zip archive of the traffic: 2018-02-28-Hancitor-malspam-infection-pcaps.zip 931.6 kB (931,569 bytes)
- 2018-02-28-Hancitor-infection-with-Zeus-Panda-Banker-1st-run.pcap (327,381 bytes)
- 2018-02-28-Hancitor-infection-with-Zeus-Panda-Banker-2nd-run.pcap (309,891 bytes)
- 2018-02-28-Hancitor-infection-with-Zeus-Panda-Banker-3rd-run.pcap (421,314 bytes)
- Zip archive of the emails: 2018-02-28-Hancitor-malspam-20-examples.txt.zip 5.5 kB (5,535 bytes)
- 2018-02-28-Hancitor-malspam-20-examples.txt (80,869 bytes)
- Zip archive of the malware: 2018-02-28-malware-from-Hancitor-infections.zip 266.3 kB (266,386 bytes)
- 2018-02-28-Hancitor-maldoc-fax_933254.doc (240,640 bytes)
- 2018-02-28-Zeus-Panda-Banker.exe (188,928 bytes)
NOTES:
- I updated the hosts file in my Windows lab hosts to generate infection traffic with some (but not all) of the alternate domains used in the initial callback and follow-up downloads.
- Still seeing Pony, Evil Pony (both resident in memory), and Zeus Panda Banker (saved to disk) as the follow-up malware.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- hnimanagement[.]com
- hnimgmt[.]com
- hnimgt[.]com
- kastarmgt[.]com
- kastarqsr[.]com
- myyogaberry[.]com
- starcorpinc[.]com
- thorsolberg[.]com
- yobe[.]me
- yoga-berry[.]com
- caledkedwron[.]com
- gotletmoked[.]ru
- ningtoftcaso[.]ru
- hxxp[:]//hestfitness[.]com/lib/flex/uploader/1
- hxxp[:]//hestfitness[.]com/lib/flex/uploader/2
- hxxp[:]//hestfitness[.]com/lib/flex/uploader/4
- hxxp[:]//gomezespejel[.]net/examples/1
- hxxp[:]//gomezespejel[.]net/examples/2
- hxxp[:]//gomezespejel[.]net/examples/4
- hxxp[:]//nectarsinc[.]com/wp-content/plugins/siteorigin-panels/settings/1
- hxxp[:]//nectarsinc[.]com/wp-content/plugins/siteorigin-panels/settings/2
- hxxp[:]//nectarsinc[.]com/wp-content/plugins/siteorigin-panels/settings/4
- ofhahertit[.]com
EMAILS
Shown above: Screenshot from one of the emails.
EMAIL HEADERS:
- Date/Time: Wednesday 2018-02-28 as early as 15:50 UTC through at least 19:25 UTC
- Received: from ([68.62.127[.]160])
- Received: from cgmdev[.]com ([73.58.50[.]32])
- Received: from cgmdev[.]com ([74.87.9[.]154])
- Received: from cgmdev[.]com ([96.84.215[.]1])
- Received: from cgmdev[.]com ([207.228.111[.]162])
- Received: from hillusa[.]com ([24.167.98[.]71])
- Received: from hillusa[.]com ([63.116.5[.]146])
- Received: from hillusa[.]com ([67.52.197[.]46])
- Received: from hillusa[.]com ([108.58.46[.]222])
- Received: from hillusa[.]com ([184.70.252[.]186])
- Received: from mtytocn[.]com ([96.88.9[.]57])
- Received: from mtytocn[.]com ([108.228.169[.]90])
- Received: from sierrasignsaz[.]com ([23.25.119[.]25])
- Received: from sierrasignsaz[.]com ([24.29.19[.]205])
- Received: from sierrasignsaz[.]com ([45.50.34[.]188])
- Received: from sierrasignsaz[.]com ([70.168.199[.]133])
- Received: from sierrasignsaz[.]com ([72.24.104[.]186])
- Received: from sierrasignsaz[.]com ([74.113.59[.]181])
- Received: from sierrasignsaz[.]com ([98.187.252[.]218])
- Received: from sierrasignsaz[.]com ([206.116.57[.]53])
- From: "eFax , Inc." <message@cgmdev[.]com>
- From: "eFax , Inc." <message@hillusa[.]com>
- From: "eFax , Inc." <message@sierrasignsaz[.]com>
- From: "eFax " <message@hillusa[.]com>
- From: "eFax " <message@mtytocn[.]com>
- From: "eFax " <message@sierrasignsaz[.]com>
- From: "eFax j2 Global, Inc." <message@cgmdev[.]com>
- From: "eFax j2 Global, Inc." <message@hillusa[.]com>
- From: "eFax j2 Global, Inc." <message@sierrasignsaz[.]com>
- From: "eFax j2 Global" <message@cgmdev[.]com>
- From: "eFax j2 Global" <message@hillusa[.]com>
- From: "eFax j2 Global" <message@mtytocn[.]com>
- From: "eFax j2 Global" <message@sierrasignsaz[.]com>
- Subject: This is an automatic eFax Notice
- Subject: This is an automatic efax Notification
- Subject: This is an electronic eFax Notice
- Subject: This is an electronic efax Notification
- Subject: This is efax Notice
- Subject: This is eFax Notification
- Subject: You have received efax Message
- Subject: You've got eFax Notice
- Subject: You've got eFax Notification
- Subject: You've received eFax Message
- Subject: You've received efax Notification
Shown above: Malicious Word document downloaded from a link in the malspam.
TRAFFIC
Shown above: Traffic from an infection filtered in Wireshark.
LINKS IN THE EMAILS TO THE WORD DOCUMENT:
- hxxp[:]//hnimanagement[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//hnimgmt[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//hnimgt[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//kastarmgt[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//kastarqsr[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//myyogaberry[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//starcorpinc[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//thorsolberg[.]com?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//yobe[.]me?[string of characters]=[encoded string representing recipient's email address]
- hxxp[:]//yoga-berry[.]com?[string of characters]=[encoded string representing recipient's email address]
NETWORK TRAFFIC FROM MY INFECTED LAB HOSTS:
- 185.36.102[.]227 port 80 - caledkedwron[.]com - POST /ls5/forum.php
- 185.36.102[.]227 port 80 - caledkedwron[.]com - POST /mlu/forum.php
- 185.36.102[.]227 port 80 - caledkedwron[.]com - POST /d2/about.php
- 104.237.129[.]124 port 80 - hestfitness[.]com - GET /lib/flex/uploader/1
- 104.237.129[.]124 port 80 - hestfitness[.]com - GET /lib/flex/uploader/2
- 104.237.129[.]124 port 80 - hestfitness[.]com - GET /lib/flex/uploader/4
- 185.154.52[.]109 port 443 - ofhahertit[.]com - HTTPS/SSL/TLS traffic from Zeus Panda Banker
- 91.214.119[.]59 port 80 - gotletmoked[.]ru - POST /ls5/forum.php
- 91.214.119[.]59 port 80 - gotletmoked[.]ru - POST /mlu/forum.php
- 91.214.119[.]59 port 80 - gotletmoked[.]ru - POST /d2/about.php
- 173.247.253[.]159 port 80 - gomezespejel[.]net - GET /examples/1
- 173.247.253[.]159 port 80 - gomezespejel[.]net - GET /examples/2
- 173.247.253[.]159 port 80 - gomezespejel[.]net - GET /examples/4
- 185.154.52[.]109 port 443 - ofhahertit[.]com - HTTPS/SSL/TLS traffic from Zeus Panda Banker
- 78.155.220[.]218 port 80 - ningtoftcaso[.]ru - POST /ls5/forum.php
- 78.155.220[.]218 port 80 - ningtoftcaso[.]ru - POST /mlu/forum.php
- 78.155.220[.]218 port 80 - ningtoftcaso[.]ru - POST /d2/about.php
- 192.254.233[.]176 port 80 - nectarsinc[.]com - GET /wp-content/plugins/siteorigin-panels/settings/1
- 192.254.233[.]176 port 80 - nectarsinc[.]com - GET /wp-content/plugins/siteorigin-panels/settings/2
- 192.254.233[.]176 port 80 - nectarsinc[.]com - GET /wp-content/plugins/siteorigin-panels/settings/4
- 185.154.52[.]109 port 443 - ofhahertit[.]com - HTTPS/SSL/TLS traffic from Zeus Panda Banker
FILE HASHES
MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:
- SHA256 hash: 5209e6d4028b82cd1a59b737ea34a69cfa924a0d690c57b52eaeb2d31868d88f
File size: 240,640 bytes
File name: fax_933254.doc [any six random digits for the numbers]
File description: Word document with macro for Hancitor
- SHA256 hash: d04124e357f6755e21cd36fefccfd7eec1a09148f41aaea25cbd326690bd4f23
File size: 188,928 bytes
File location: C:\Users\[username]\AppData\Local\[existing directory path]\[random name].exe
File description: Zeus Panda Banker
Click here to return to the main page.