2018-03-06 - HANCITOR INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- Zip archive of the traffic: 2018-03-06-Hancitor-infection-with-Zeus-Panda-Banker.pcap.zip 2.2 MB (2,177,653 bytes)
 
- 2018-03-06-Hancitor-infection-with-Zeus-Panda-Banker.pcap (2,561,762 bytes)
 
- Zip archive of the emails: 2018-03-06-Hancitor-malspam-26-examples.txt.zip 7.5 kB (7,442 bytes)
 
- 2018-03-06-Hancitor-malspam-26-examples.txt (162,412 bytes)
 
- Zip archive of the malware: 2018-03-06-malware-from-Hancitor-infection.zip 252 kB (252,208 bytes)
 
- 2018-03-06-Hancitor-maldoc-invoice_387239.doc (259,072 bytes)
 - 2018-03-06-Zeus-Panda-Banker.exe (164,352 bytes)
 
NOTES:
- As usual, for the 3 follow-up downloads, we're still seeing Pony, Evil Pony (both resident in memory), and Zeus Panda Banker (saved to disk).
 - The block list contains additional post-infection URLs originally reported by @Techhelplistcom on the VirusTotal entry for today's Word document.
 - As always, thanks to everyone who keeps an eye on this malspam and reports about it on Twitter. Your tweets help more than you realize.
 
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- babyfurniturewarehouse[.]com
 - buildwith307[.]com
 - carrythelamp[.]net
 - dickswingsgrill[.]com
 - freedomtonurse[.]net
 - freeholdsurgical[.]net
 - freeholdsurgical[.]org
 - hnigrp[.]com
 - hniltd[.]com
 - myyobe[.]biz
 - nightingalenurses[.]org
 - wingsfinger[.]com
 - wingsfingers[.]com
 - tebabretof[.]com
 - dinglebetna[.]ru
 - etranutha[.]ru
 - hxxp[:]//gamesfree247[.]info/1
 - hxxp[:]//gamesfree247[.]info/2
 - hxxp[:]//gamesfree247[.]info/3
 - hxxp[:]//ncbc.co[.]za/wp-content/plugins/twg-members/1
 - hxxp[:]//ncbc.co[.]za/wp-content/plugins/twg-members/2
 - hxxp[:]//ncbc.co[.]za/wp-content/plugins/twg-members/3
 - hxxp[:]//lifemotivator[.]tv/wp-content/plugins/contact-form-7/includes/1
 - hxxp[:]//lifemotivator[.]tv/wp-content/plugins/contact-form-7/includes/2
 - hxxp[:]//lifemotivator[.]tv/wp-content/plugins/contact-form-7/includes/3
 - hxxp[:]//gigabitsoftware[.]com/wp-content/plugins/backupbuddy/1
 - hxxp[:]//gigabitsoftware[.]com/wp-content/plugins/backupbuddy/2
 - hxxp[:]//gigabitsoftware[.]com/wp-content/plugins/backupbuddy/3
 - hxxp[:]//printforall[.]ro/wp-content/plugins/simple-meta-tags/1
 - hxxp[:]//printforall[.]ro/wp-content/plugins/simple-meta-tags/2
 - hxxp[:]//printforall[.]ro/wp-content/plugins/simple-meta-tags/3
 - ofhahertit[.]com
 
EMAILS

Shown above:  Screenshot from one of the emails.
EMAIL HEADERS:
- Date/Time: Tuesday 2018-03-06 as early as 17:40 UTC through at least 20:59 UTC
 
- Received: from bandgequipment[.]com ([24.37.246[.]50])
 - Received: from bandgequipment[.]com ([24.123.173[.]42])
 - Received: from bandgequipment[.]com ([24.197.23[.]66])
 - Received: from bandgequipment[.]com ([50.27.155[.]34])
 - Received: from bandgequipment[.]com ([50.192.158[.]228])
 - Received: from bandgequipment[.]com ([67.185.1[.]213])
 - Received: from bandgequipment[.]com ([68.173.167[.]190])
 - Received: from bandgequipment[.]com ([69.67.101[.]131])
 - Received: from bandgequipment[.]com ([70.168.199[.]133])
 - Received: from bandgequipment[.]com ([71.95.218[.]234])
 - Received: from bandgequipment[.]com ([75.88.14[.]241])
 - Received: from bandgequipment[.]com ([97.84.33[.]210])
 - Received: from bandgequipment[.]com ([98.101.194[.]106])
 - Received: from bandgequipment[.]com ([100.8.232[.]154])
 - Received: from bandgequipment[.]com ([131.161.86[.]199])
 - Received: from bandgequipment[.]com ([137.101.218[.]89])
 - Received: from bandgequipment[.]com ([137.188.108[.]19])
 - Received: from bandgequipment[.]com ([173.12.239[.]115])
 - Received: from bandgequipment[.]com ([184.71.42[.]34])
 - Received: from bandgequipment[.]com ([206.63.234[.]219])
 - Received: from bandgequipment[.]com ([216.3.207[.]162])
 - Received: from nxgndata[.]com ([50.255.94[.]41])
 - Received: from nxgndata[.]com ([67.213.231[.]13])
 - Received: from nxgndata[.]com ([72.93.244[.]154])
 - Received: from nxgndata[.]com ([173.12.239[.]115])
 - Received: from nxgndata[.]com ([184.71.42[.]34])
 
- From: "DocuSign Electronic Signature Service" <invoice@bandgequipment[.]com>
 - From: "DocuSign Electronic Signature " <invoice@bandgequipment[.]com>
 - From: "DocuSign Electronic Signature " <invoice@nxgndata[.]com>
 - From: "DocuSign Electronic Signature and Invoice Service" <invoice@bandgequipment[.]com>
 - From: "DocuSign Electronic Signature and Invoice Service" <invoice@nxgndata[.]com>
 - From: "DocuSign Electronic Signature and Invoice" <invoice@bandgequipment[.]com>
 - From: "DocuSign Signature Service" <invoice@bandgequipment[.]com>
 - From: "DocuSign Signature Service" <invoice@nxgndata[.]com>
 - From: "DocuSign Signature " <invoice@bandgequipment[.]com>
 - From: "DocuSign Signature " <invoice@nxgndata[.]com>
 - From: "DocuSign Signature and Invoice Service" <invoice@bandgequipment[.]com>
 - From: "DocuSign Signature and Invoice" <invoice@bandgequipment[.]com>
 - From: "DocuSign Signature and Invoice" <invoice@nxgndata[.]com>
 
- Subject: You got invoice from DocuSign Electronic Service
 - Subject: You got invoice from DocuSign Electronic Signature Service
 - Subject: You got invoice from DocuSign Signature Service
 - Subject: You got notification from DocuSign Service
 - Subject: You got notification from DocuSign Signature Service
 - Subject: You received invoice from DocuSign Electronic Service
 - Subject: You received invoice from DocuSign Electronic Signature Service
 - Subject: You received invoice from DocuSign Service
 - Subject: You received invoice from DocuSign Signature Service
 - Subject: You received notification from DocuSign Electronic Service
 - Subject: You received notification from DocuSign Electronic Signature Service
 - Subject: You received notification from DocuSign Service
 - Subject: You received notification from DocuSign Signature Service
 

Shown above:  Malicious Word document downloaded from a link in the malspam.
TRAFFIC

Shown above:  Traffic from an infection filtered in Wireshark.
LINKS IN THE EMAILS FOR THE WORD DOCUMENT:
- hxxp[:]//babyfurniturewarehouse[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//buildwith307[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//carrythelamp[.]net?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//dickswingsgrill[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//freedomtonurse[.]net?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//freeholdsurgical[.]net?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//freeholdsurgical[.]org?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//hnigrp[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//hniltd[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//myyobe[.]biz?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//nightingalenurses[.]org?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//wingsfinger[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//wingsfingers[.]com?[string of characters]=[encoded string representing recipient's email address]
 
NETWORK TRAFFIC FROM AN INFECTED LAB HOST:
- 95.213.203[.]60 port 80 - buildwith307[.]com - GET /?[string of characters]=[encoded string representing recipient's email address]
 - port 80 - api.ipify[.]org - GET /
 - 185.74.255[.]109 port 80 - tebabretof[.]com - POST /ls5/forum.php
 - 185.74.255[.]109 port 80 - tebabretof[.]com - POST /mlu/forum.php
 - 185.74.255[.]109 port 80 - tebabretof[.]com - POST /d2/about.php
 - 192.232.223[.]48 port 80 - gamesfree247[.]info - GET /1
 - 192.232.223[.]48 port 80 - gamesfree247[.]info - GET /2
 - 192.232.223[.]48 port 80 - gamesfree247[.]info - GET /3
 - 192.71.247[.]158 port 443 - ofhahertit[.]com - HTTPS/SSL/TLS traffic from Zeus Panda Banker
 - port 443 - google[.]com - connectivity check caused by Zeus Panda Banker
 
FILE HASHES
MALWARE RETRIEVED FROM AN INFECTED WINDOWS HOST:
- SHA256 hash:  60149abf042392e352795c4bb2d731a75332e4bceb0daf83164baa0dcfa0dcd3
File size: 259,072 bytes
File name: invoice_387239.doc [any six random digits for the numbers]
File description: Word document with macro for Hancitor 
- SHA256 hash:  f6df24d8a669b5ad298a47b9cd7fb2800e46c2cac75ee519955137b7d2abdb6f
File size: 164,352 bytes
File location: C:\Users\[username]\AppData\Local\[existing directory path]\[random name].exe
File description: Zeus Panda Banker 
IMAGES

Shown above:  Zeus Panda Banker persistent on an infected Windows host.
Click here to return to the main page.
