ExecuteMalware

2021-07-12 Hancitor IOCs

Jul 12th, 2021
16,163
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.59 KB | None | 0 0
  1. THREAT IDENTIFICATION: HANCITOR / FICKER STEALER / COBALT STRIKE
  2.  
  3. HANCITOR BUILD NUMBER
  4. BUILD=1207_cvefop
  5.  
  6. SUBJECTS OBSERVED
  7. You got invoice from DocuSign Electronic Service
  8. You got invoice from DocuSign Electronic Signature Service
  9. You got invoice from DocuSign Service
  10. You got invoice from DocuSign Signature Service
  11. You got notification from DocuSign Electronic Signature Service
  12. You got notification from DocuSign Service
  13. You received invoice from DocuSign Electronic Service
  14. You received invoice from DocuSign Electronic Signature Service
  15. You received invoice from DocuSign Service
  16. You received invoice from DocuSign Signature Service
  17. You received notification from DocuSign Electronic Signature Service
  18. You received notification from DocuSign Service
  19. You received notification from DocuSign Signature Service
  20.  
  21. SENDERS OBSERVED
  22.  
  23. MALDOC PROXY DISTRIBUTION URLS
  24. http://feedproxy.google.com/~r/aiaaf/~3/pkLXnPHczRw/trackball.php
  25. http://feedproxy.google.com/~r/bhsuiuydhd/~3/zCultSWm5Rk/unequal.php
  26. http://feedproxy.google.com/~r/covpcktopt/~3/GmwkNzndgV4/incur.php
  27. http://feedproxy.google.com/~r/cuywjhi/~3/qOJn90FYfqE/ambitiously.php
  28. http://feedproxy.google.com/~r/cxtyhak/~3/GXOZgFJrjWg/accrual.php
  29. http://feedproxy.google.com/~r/datrp/~3/LE22rQ0WXuI/cornerstone.php
  30. http://feedproxy.google.com/~r/eelzda/~3/Vr7xUUfJ-1Y/truckage.php
  31. http://feedproxy.google.com/~r/jwswdkj/~3/PboyzzdLDzw/achievement.php
  32. http://feedproxy.google.com/~r/lrzayuvxcqf/~3/qbUWZ-gO0hU/bucking.php
  33. http://feedproxy.google.com/~r/mipjbaz/~3/rlONcxONhH8/usurper.php
  34. http://feedproxy.google.com/~r/msaom/~3/Iy1bR52MsZk/acquittance.php
  35. http://feedproxy.google.com/~r/ndgjimvgz/~3/46rfXdUDOlg/pollinate.php
  36. http://feedproxy.google.com/~r/nihoraokb/~3/To5n9BFqs8M/obscene.php
  37. http://feedproxy.google.com/~r/nmrygkkelcn/~3/cRNAP-4Kchk/participating.php
  38. http://feedproxy.google.com/~r/okmvgmutor/~3/ldMCg5CLbtM/splatter.php
  39. http://feedproxy.google.com/~r/qxepbiho/~3/I1LSZq1PR8s/trafficked.php
  40. http://feedproxy.google.com/~r/rltgxh/~3/0HrENsYcYg0/clasp.php
  41. http://feedproxy.google.com/~r/shtegfvmux/~3/fXYI00aksec/sticker.php
  42. http://feedproxy.google.com/~r/tjazygwa/~3/46rfXdUDOlg/pollinate.php
  43. http://feedproxy.google.com/~r/txrxnann/~3/4mLXkoFEIUA/saunterer.php
  44. http://feedproxy.google.com/~r/ufyezjtkhb/~3/sl-3zP5QZiY/vantage.php
  45. http://feedproxy.google.com/~r/uipdj/~3/Iy1bR52MsZk/acquittance.php
  46. http://feedproxy.google.com/~r/xoxpsyqiejl/~3/W9n5M-mPa60/figurehead.php
  47. http://feedproxy.google.com/~r/ycfjvipeip/~3/aC32d5FfLi8/idly.php
  48. http://feedproxy.google.com/~r/yshrbiqz/~3/9BRJIHIRL1A/jewelery.php
  49. http://feedproxy.google.com/~r/zqztw/~3/Yhw5DKajWQQ/wastefully.php
  50.  
  51. MALDOC REDIRECT DOWNLOAD URLS
  52. http://2020disposalservices.com/accrual.php
  53. http://an.nastena.lv/achievement.php
  54. http://dohastuff.com/incur.php
  55. http://dohastuff.com/truckage.php
  56. http://grecozenobi.com.ar/usurper.php
  57. http://gunsify.com/cornerstone.php
  58. http://lineacisne.cl/obscene.php
  59. http://mohammadtalks.com/vantage.php
  60. http://nocturnalpro.com/trackball.php
  61. http://odas.ubicuo.site/ambitiously.php
  62. http://odas.ubicuo.site/participating.php
  63. http://pphc.welkinfortprojects.com/unequal.php
  64. http://redessoft.com/jewelery.php
  65. http://seatranscorp.com/wastefully.php
  66. http://www.agfphx.com/clasp.php
  67. http://www.agfphx.com/figurehead.php
  68. https://affirmingyourlife.com/saunterer.php
  69. https://affirmingyourlife.com/sticker.php
  70. https://amazingholidaysmaldives.com/bucking.php
  71. https://autoscrapforcash.com/idly.php
  72. https://autoscrapforcash.com/trafficked.php
  73. https://dsmsystem.com.py/acquittance.php
  74. https://www.ivrvirtualsolutions.com/pollinate.php
  75. https://www.thebeing.com.br/splatter.php
  76.  
  77. 2020disposalservices.com
  78. affirmingyourlife.com
  79. agfphx.com
  80. amazingholidaysmaldives.com
  81. autoscrapforcash.com
  82. dohastuff.com
  83. dsmsystem.com.py
  84. grecozenobi.com.ar
  85. gunsify.com
  86. ivrvirtualsolutions.com
  87. lineacisne.cl
  88. mohammadtalks.com
  89. nastena.lv
  90. nocturnalpro.com
  91. redessoft.com
  92. seatranscorp.com
  93. thebeing.com.br
  94. ubicuo.site
  95. welkinfortprojects.com
  96.  
  97. MALDOC DOC FILE HASHES
  98. 29cc4e2bf456d2f509e6edbbe0facff6
  99. 68da25a05ddc6b1e7e04fd5fa4cf76db
  100. 799b389ea1bfd39bddc2b94d5c31c878
  101. 7ec89cb32223faef52de0f4bdb240226
  102. 93e0589ddf297fcbd925b54b371b8e8b
  103. 9f0251c4ce4353c06f2163bb3aec1013
  104. a8522da79c82b2d2264985e9d63b625a
  105. b84bb5ce6ac0d377b8849d4f826355f3
  106. bad7b7001ea2d5fc7569eb32b328674e
  107. d3891b7c3c73ebcc3a8ab48331c02914
  108. e63281e29d20950bd7d30d3ffa7d360f
  109. ef0511c9a7b701323548188e59b779bf
  110. f0f4279d94c9fae37a3deb4dab5b3e5a
  111.  
  112. HANCITOR PAYLOAD FILE HASH
  113. ier.dll
  114. 14b3976c264c2a8a2dcb06df09c7a093
  115.  
  116. HANCITOR C2
  117. http://factoothfand.ru/8/forum.php
  118. http://olinsartain.ru/8/forum.php
  119. http://trictuatiove.com/8/forum.php
  120.  
  121. FICKER STEALER DOWNLOAD URL
  122. http://pirocont70l.ru/7hjujnfds.exe
  123.  
  124. FICKER STEALER FILE HASH
  125. 7hjujnfds.exe
  126. 270c3859591599642bd15167765246e3
  127.  
  128. FICKER C2
  129. http://pospvisis.com
  130.  
  131. COBALT STRIKE STAGER DOWNLOAD URLS
  132. http://pirocont70l.ru/1207.bin
  133. http://pirocont70l.ru/1207s.bin
  134.  
  135. COBALT STRIKE STAGER FILE HASHES
  136. 1207.bin
  137. 26e559ca6e38cbafd20c1dd7484c2385
  138.  
  139. 1207s.bin
  140. ffd8acab871ffd27b08b6deb13bc363c
  141.  
  142. COBALT STRIKE BEACON DOWNLOAD URL
  143. http://92.119.157.74/8Qkh
  144.  
  145. COBALT STRIKE BEACON FILE HASH
  146. 8Qkh
  147. 261db9a2054262e6c18c07c7ddd42a95
  148.  
  149. COBALT STRIKE C2
  150. http://92.119.157.74/dot.gif
  151.  
  152. ADDITIONAL COBALT STRIKE URLS FROM STRINGS IN MEMORY
  153. https://92.119.157.74/Bsr5
  154. https://92.119.157.74/IE9CompatViewList.xml
  155.  
  156.  
  157. COBALT STRIKE BEACON CONFIG (from Didier Stevens' 1768 tool)
  158. File: 8Qkh
  159. xorkey(chain): 0x8aefd22e
  160. length: 0x00033400
  161. payloadType: 0x10014fc2
  162. payloadSize: 0x00000000
  163. intxorkey: 0x00000000
  164. id2: 0x00000000
  165. Config found: xorkey b'.' 0x00030220 0x00033400
  166. 0x0001 payload type 0x0001 0x0002 0 windows-beacon_http-reverse_http
  167. 0x0002 port 0x0001 0x0002 80
  168. 0x0003 sleeptime 0x0002 0x0004 60000
  169. 0x0004 maxgetsize 0x0002 0x0004 1048576
  170. 0x0005 jitter 0x0001 0x0002 0
  171. 0x0007 publickey 0x0003 0x0100 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
  172. 0x0008 server,get-uri 0x0003 0x0100 '92.119.157.74,/dot.gif'
  173. 0x0043 0x0001 0x0002 0
  174. 0x0044 0x0002 0x0004 4294967295
  175. 0x0045 0x0002 0x0004 4294967295
  176. 0x0046 0x0002 0x0004 4294967295
  177. 0x000e SpawnTo 0x0003 0x0010 (NULL ...)
  178. 0x001d spawnto_x86 0x0003 0x0040 '%windir%\\syswow64\\rundll32.exe'
  179. 0x001e spawnto_x64 0x0003 0x0040 '%windir%\\sysnative\\rundll32.exe'
  180. 0x001f CryptoScheme 0x0001 0x0002 0
  181. 0x001a get-verb 0x0003 0x0010 'GET'
  182. 0x001b post-verb 0x0003 0x0010 'POST'
  183. 0x001c HttpPostChunk 0x0002 0x0004 0
  184. 0x0025 license-id 0x0002 0x0004 0
  185. 0x0026 bStageCleanup 0x0001 0x0002 0
  186. 0x0027 bCFGCaution 0x0001 0x0002 0
  187. 0x0009 useragent 0x0003 0x0100 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)'
  188. 0x000a post-uri 0x0003 0x0040 '/submit.php'
  189. 0x000b Malleable_C2_Instructions 0x0003 0x0100 '\x00\x00\x00\x04'
  190. 0x000c http_get_header 0x0003 0x0200
  191. b'Cookie'
  192. 0x000d http_post_header 0x0003 0x0200
  193. b'&Content-Type: application/octet-stream'
  194. b'id'
  195. 0x0036 HostHeader 0x0003 0x0080 (NULL ...)
  196. 0x0032 UsesCookies 0x0001 0x0002 1
  197. 0x0023 proxy_type 0x0001 0x0002 2 IE settings
  198. 0x003a 0x0003 0x0080 '\x00\x04'
  199. 0x0039 0x0003 0x0080 '\x00\x04'
  200. 0x0037 0x0001 0x0002 0
  201. 0x0028 killdate 0x0002 0x0004 0
  202. 0x0029 textSectionEnd 0x0002 0x0004 0
  203. 0x002b process-inject-start-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
  204. 0x002c process-inject-use-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
  205. 0x002d process-inject-min_alloc 0x0002 0x0004 0
  206. 0x002e process-inject-transform-x86 0x0003 0x0100 (NULL ...)
  207. 0x002f process-inject-transform-x64 0x0003 0x0100 (NULL ...)
  208. 0x0035 process-inject-stub 0x0003 0x0010 '2ÍAíð\x81\x0c[_I\x8eßG1Ìm'
  209. 0x0033 process-inject-execute 0x0003 0x0080 '\x01\x02\x03\x04'
  210. 0x0034 process-inject-allocation-method 0x0001 0x0002 0
  211.  
  212.  
  213.  
  214.  
  215.  
Advertisement
Add Comment
Please, Sign In to add comment