2018-08-16 - HANCITOR INFECTION WITH ZEUS PANDA BANKER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2018-08-16-Hancitor-malspam-example.eml.zip 2 kB (2,031 bytes)
 - 2018-08-16-Hancitor-infection-with-Zeus-Panda-Banker.pcap.zip 526 kB (525,824 bytes)
 - 2018-08-16-malware-from-Hancitor-infection.zip 334 kB (333,803 bytes)
 
NOTES:
- The block list contains additional info first reported in the VirusBay entry for the associated Word document, as well as some other sources.
 - As always, my thanks to everyone who keeps an eye on this malspam and reports about it near-real-time on Twitter.
 
Shown above: Flow chart for a typical Hancitor malspam infection.
WEB TRAFFIC BLOCK LIST
Indicators are not a block list. If you feel the need to block web traffic, I suggest the following domains and URLs:
- backhomebail[.]com
 - biggaybrunch[.]info
 - biggaybrunch[.]net
 - biggaybrunch[.]org
 - clearrochester[.]com
 - dtvrochester[.]com
 - gaymovetodenver[.]com
 - glbtmovetodenver[.]com
 - hatcreekurnco[.]com
 - lgbtmovetodenver[.]com
 - omnibox[.]me
 - omnibox[.]mobi
 - outcolorado[.]info
 - outcolorado[.]net
 - outcolorado[.]org
 - smarthomeiconnect[.]com
 - wildblueny[.]com
 - hxxp[:]//alyssaritchey[.]com/wp-content/plugins/title-remover/1
 - hxxp[:]//alyssaritchey[.]com/wp-content/plugins/title-remover/2
 - hxxp[:]//alyssaritchey[.]com/wp-content/plugins/title-remover/3
 - hxxp[:]//community-growth[.]org/wp-content/plugins/cryout-theme-settings/inc/1
 - hxxp[:]//community-growth[.]org/wp-content/plugins/cryout-theme-settings/inc/2
 - hxxp[:]//community-growth[.]org/wp-content/plugins/cryout-theme-settings/inc/3
 - hxxp[:]//taxgals[.]com/wp-content/themes/twentythirteen/inc/1
 - hxxp[:]//taxgals[.]com/wp-content/themes/twentythirteen/inc/2
 - hxxp[:]//taxgals[.]com/wp-content/themes/twentythirteen/inc/3
 - soutmestiho[.]com
 - enbetishect[.]ru
 - gesinaleft[.]ru
 - inghapwilhe[.]ru
 
HEADERS FROM A MALSPAM EXAMPLE

Shown above:  Screenshot from one of the emails.
Received: from fallsgrovedentistry[.]com ([65.98.129[.]162]) by [removed] for [removed];
        Thu, 16 Aug 2018 17:33:44 +0000 (UTC)
Message-ID: <69C3514D.706FA590@fallsgrovedentistry[.]com>
Date: Thu, 16 Aug 2018 10:33:46 -0700
Reply-To: "AT&T Inc. " <att@fallsgrovedentistry[.]com>
From: "AT&T Inc. " <att@fallsgrovedentistry[.]com>
X-Mailer: iPhone Mail (11D201)
X-Accept-Language: en-us
MIME-Version: 1.0
TO: [removed]
Subject: Your wireless invoice notification from AT&T

Shown above:  Malicious Word document downloaded from link in the malspam.
TRAFFIC
LINKS IN THE EMAILS TO DOWNLOAD THE WORD DOCUMENT:
- hxxp[:]//backhomebail[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//biggaybrunch[.]info?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//biggaybrunch[.]net?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//biggaybrunch[.]org?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//clearrochester[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//dtvrochester[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//gaymovetodenver[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//glbtmovetodenver[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//hatcreekurnco[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//lgbtmovetodenver[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//omnibox[.]me?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//omnibox[.]mobi?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//outcolorado[.]info?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//outcolorado[.]net?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//outcolorado[.]org?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//smarthomeiconnect[.]com?[string of characters]=[encoded string representing recipient's email address]
 - hxxp[:]//wildblueny[.]com?[string of characters]=[encoded string representing recipient's email address]
 

Shown above:  Traffic from an infection filtered in Wireshark.

Shown above:  Traffic from from failed TCP connections by soutmestiho.com filtered in Wireshark.
TRAFFIC FROM AN INFECTED WINDOWS HOST:
- 95.213.237[.]64 port 80 - outcolorado[.]info - GET /?[string of characters]=[encoded string representing recipient's email address]
 - port 80 - api.ipify[.]org - GET /
 - 178.208.80[.]127 port 80 - soutmestiho[.]com - Attempted TCP connections, but no response or RST from the server
 - 77.246.145[.]8 port 80 - enbetishect[.]ru - POST /4/forum.php
 - 77.246.145[.]8 port 80 - enbetishect[.]ru - POST /mlu/about.php
 - 77.246.145[.]8 port 80 - enbetishect[.]ru - POST /d2/about.php
 - 192.185.17[.]127 port 80 - community-growth[.]org - GET /wp-content/plugins/cryout-theme-settings/inc/1
 - 192.185.17[.]127 port 80 - community-growth[.]org - GET /wp-content/plugins/cryout-theme-settings/inc/2
 - 192.185.17[.]127 port 80 - community-growth[.]org - GET /wp-content/plugins/cryout-theme-settings/inc/3
 - 185.7.30[.]147 port 443 - inghapwilhe[.]ru - HTTPS/SSL/TLS traffic [Zeus Panda Banker]
 - port 443 - www.google[.]com - connectivity check by infected Windows host [Zeus Panda Banker]
 
FILE HASHES
MALWARE RETRIEVED FROM MY INFECTED WINDOWS HOST:
- SHA256 hash:  e1a2cdab779ee1237c638fea4b9d4dca0591d16f9e4fc208a7486fd6d26523cf
File size: 201,216 bytes
File name: invoice_142098.doc (random file names)
File description: Word doc downloaded from a link in Hancitor malspam. Doc has macro to retreive Hancitor. 
- SHA256 hash:  a388a50081111d0252eb4c638421ad6b5d13dee6f2e374b0c3a40138227f9ac0
File size: 58,880 bytes
File location: C:\Users\[username]\AppData\Local\Temp\6.exe
File location: C:\Users\[username]\AppData\Local\Temp\6.pif
File description: Hancitor malware binary retrieved by macro in downloaded Word doc 
- SHA256 hash:  ad7b21f9c14c49ea28f7e98a8e3b44973446342537d9817ec91c13681bae0023
File size: 218,624 bytes
File location: C:\Users\[username]\AppData\Roaming\[existing directory path]\[random file name].exe
File description: Zeus Panda Banker on 2018-08-16 caused by Hancitor infection 
Click here to return to the main page.

