Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- THREAT IDENTIFICATION: HANCITOR / FICKER STEALER / COBALT STRIKE
- HANCITOR BUILD NUMBER
- BUILD=1207_cvefop
- SUBJECTS OBSERVED
- You got invoice from DocuSign Electronic Service
- You got invoice from DocuSign Electronic Signature Service
- You got invoice from DocuSign Service
- You got invoice from DocuSign Signature Service
- You got notification from DocuSign Electronic Signature Service
- You got notification from DocuSign Service
- You received invoice from DocuSign Electronic Service
- You received invoice from DocuSign Electronic Signature Service
- You received invoice from DocuSign Service
- You received invoice from DocuSign Signature Service
- You received notification from DocuSign Electronic Signature Service
- You received notification from DocuSign Service
- You received notification from DocuSign Signature Service
- SENDERS OBSERVED
- MALDOC PROXY DISTRIBUTION URLS
- http://feedproxy.google.com/~r/aiaaf/~3/pkLXnPHczRw/trackball.php
- http://feedproxy.google.com/~r/bhsuiuydhd/~3/zCultSWm5Rk/unequal.php
- http://feedproxy.google.com/~r/covpcktopt/~3/GmwkNzndgV4/incur.php
- http://feedproxy.google.com/~r/cuywjhi/~3/qOJn90FYfqE/ambitiously.php
- http://feedproxy.google.com/~r/cxtyhak/~3/GXOZgFJrjWg/accrual.php
- http://feedproxy.google.com/~r/datrp/~3/LE22rQ0WXuI/cornerstone.php
- http://feedproxy.google.com/~r/eelzda/~3/Vr7xUUfJ-1Y/truckage.php
- http://feedproxy.google.com/~r/jwswdkj/~3/PboyzzdLDzw/achievement.php
- http://feedproxy.google.com/~r/lrzayuvxcqf/~3/qbUWZ-gO0hU/bucking.php
- http://feedproxy.google.com/~r/mipjbaz/~3/rlONcxONhH8/usurper.php
- http://feedproxy.google.com/~r/msaom/~3/Iy1bR52MsZk/acquittance.php
- http://feedproxy.google.com/~r/ndgjimvgz/~3/46rfXdUDOlg/pollinate.php
- http://feedproxy.google.com/~r/nihoraokb/~3/To5n9BFqs8M/obscene.php
- http://feedproxy.google.com/~r/nmrygkkelcn/~3/cRNAP-4Kchk/participating.php
- http://feedproxy.google.com/~r/okmvgmutor/~3/ldMCg5CLbtM/splatter.php
- http://feedproxy.google.com/~r/qxepbiho/~3/I1LSZq1PR8s/trafficked.php
- http://feedproxy.google.com/~r/rltgxh/~3/0HrENsYcYg0/clasp.php
- http://feedproxy.google.com/~r/shtegfvmux/~3/fXYI00aksec/sticker.php
- http://feedproxy.google.com/~r/tjazygwa/~3/46rfXdUDOlg/pollinate.php
- http://feedproxy.google.com/~r/txrxnann/~3/4mLXkoFEIUA/saunterer.php
- http://feedproxy.google.com/~r/ufyezjtkhb/~3/sl-3zP5QZiY/vantage.php
- http://feedproxy.google.com/~r/uipdj/~3/Iy1bR52MsZk/acquittance.php
- http://feedproxy.google.com/~r/xoxpsyqiejl/~3/W9n5M-mPa60/figurehead.php
- http://feedproxy.google.com/~r/ycfjvipeip/~3/aC32d5FfLi8/idly.php
- http://feedproxy.google.com/~r/yshrbiqz/~3/9BRJIHIRL1A/jewelery.php
- http://feedproxy.google.com/~r/zqztw/~3/Yhw5DKajWQQ/wastefully.php
- MALDOC REDIRECT DOWNLOAD URLS
- http://2020disposalservices.com/accrual.php
- http://an.nastena.lv/achievement.php
- http://dohastuff.com/incur.php
- http://dohastuff.com/truckage.php
- http://grecozenobi.com.ar/usurper.php
- http://gunsify.com/cornerstone.php
- http://lineacisne.cl/obscene.php
- http://mohammadtalks.com/vantage.php
- http://nocturnalpro.com/trackball.php
- http://odas.ubicuo.site/ambitiously.php
- http://odas.ubicuo.site/participating.php
- http://pphc.welkinfortprojects.com/unequal.php
- http://redessoft.com/jewelery.php
- http://seatranscorp.com/wastefully.php
- http://www.agfphx.com/clasp.php
- http://www.agfphx.com/figurehead.php
- https://affirmingyourlife.com/saunterer.php
- https://affirmingyourlife.com/sticker.php
- https://amazingholidaysmaldives.com/bucking.php
- https://autoscrapforcash.com/idly.php
- https://autoscrapforcash.com/trafficked.php
- https://dsmsystem.com.py/acquittance.php
- https://www.ivrvirtualsolutions.com/pollinate.php
- https://www.thebeing.com.br/splatter.php
- 2020disposalservices.com
- affirmingyourlife.com
- agfphx.com
- amazingholidaysmaldives.com
- autoscrapforcash.com
- dohastuff.com
- dsmsystem.com.py
- grecozenobi.com.ar
- gunsify.com
- ivrvirtualsolutions.com
- lineacisne.cl
- mohammadtalks.com
- nastena.lv
- nocturnalpro.com
- redessoft.com
- seatranscorp.com
- thebeing.com.br
- ubicuo.site
- welkinfortprojects.com
- MALDOC DOC FILE HASHES
- 29cc4e2bf456d2f509e6edbbe0facff6
- 68da25a05ddc6b1e7e04fd5fa4cf76db
- 799b389ea1bfd39bddc2b94d5c31c878
- 7ec89cb32223faef52de0f4bdb240226
- 93e0589ddf297fcbd925b54b371b8e8b
- 9f0251c4ce4353c06f2163bb3aec1013
- a8522da79c82b2d2264985e9d63b625a
- b84bb5ce6ac0d377b8849d4f826355f3
- bad7b7001ea2d5fc7569eb32b328674e
- d3891b7c3c73ebcc3a8ab48331c02914
- e63281e29d20950bd7d30d3ffa7d360f
- ef0511c9a7b701323548188e59b779bf
- f0f4279d94c9fae37a3deb4dab5b3e5a
- HANCITOR PAYLOAD FILE HASH
- ier.dll
- 14b3976c264c2a8a2dcb06df09c7a093
- HANCITOR C2
- http://factoothfand.ru/8/forum.php
- http://olinsartain.ru/8/forum.php
- http://trictuatiove.com/8/forum.php
- FICKER STEALER DOWNLOAD URL
- http://pirocont70l.ru/7hjujnfds.exe
- FICKER STEALER FILE HASH
- 7hjujnfds.exe
- 270c3859591599642bd15167765246e3
- FICKER C2
- http://pospvisis.com
- COBALT STRIKE STAGER DOWNLOAD URLS
- http://pirocont70l.ru/1207.bin
- http://pirocont70l.ru/1207s.bin
- COBALT STRIKE STAGER FILE HASHES
- 1207.bin
- 26e559ca6e38cbafd20c1dd7484c2385
- 1207s.bin
- ffd8acab871ffd27b08b6deb13bc363c
- COBALT STRIKE BEACON DOWNLOAD URL
- http://92.119.157.74/8Qkh
- COBALT STRIKE BEACON FILE HASH
- 8Qkh
- 261db9a2054262e6c18c07c7ddd42a95
- COBALT STRIKE C2
- http://92.119.157.74/dot.gif
- ADDITIONAL COBALT STRIKE URLS FROM STRINGS IN MEMORY
- https://92.119.157.74/Bsr5
- https://92.119.157.74/IE9CompatViewList.xml
- COBALT STRIKE BEACON CONFIG (from Didier Stevens' 1768 tool)
- File: 8Qkh
- xorkey(chain): 0x8aefd22e
- length: 0x00033400
- payloadType: 0x10014fc2
- payloadSize: 0x00000000
- intxorkey: 0x00000000
- id2: 0x00000000
- Config found: xorkey b'.' 0x00030220 0x00033400
- 0x0001 payload type 0x0001 0x0002 0 windows-beacon_http-reverse_http
- 0x0002 port 0x0001 0x0002 80
- 0x0003 sleeptime 0x0002 0x0004 60000
- 0x0004 maxgetsize 0x0002 0x0004 1048576
- 0x0005 jitter 0x0001 0x0002 0
- 0x0007 publickey 0x0003 0x0100 30819f300d06092a864886f70d010101050003818d0030818902818100a738cde75f1fbb1c18646c377e03016b162b12ba72bdf7dc36b4cd2e4e9bae12205a95c26170bf908105ad7fa4bbccfa798632261bed9870f975f20794e1fe499523d71f08a56cae0315bfde3d6c8a16386b03b7a6551aa1336d50325a3500db27d78ad8fd13b6a73b9fb7c3fb4d7a088e323f07618656ecd83595fa5f823613020301000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
- 0x0008 server,get-uri 0x0003 0x0100 '92.119.157.74,/dot.gif'
- 0x0043 0x0001 0x0002 0
- 0x0044 0x0002 0x0004 4294967295
- 0x0045 0x0002 0x0004 4294967295
- 0x0046 0x0002 0x0004 4294967295
- 0x000e SpawnTo 0x0003 0x0010 (NULL ...)
- 0x001d spawnto_x86 0x0003 0x0040 '%windir%\\syswow64\\rundll32.exe'
- 0x001e spawnto_x64 0x0003 0x0040 '%windir%\\sysnative\\rundll32.exe'
- 0x001f CryptoScheme 0x0001 0x0002 0
- 0x001a get-verb 0x0003 0x0010 'GET'
- 0x001b post-verb 0x0003 0x0010 'POST'
- 0x001c HttpPostChunk 0x0002 0x0004 0
- 0x0025 license-id 0x0002 0x0004 0
- 0x0026 bStageCleanup 0x0001 0x0002 0
- 0x0027 bCFGCaution 0x0001 0x0002 0
- 0x0009 useragent 0x0003 0x0100 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)'
- 0x000a post-uri 0x0003 0x0040 '/submit.php'
- 0x000b Malleable_C2_Instructions 0x0003 0x0100 '\x00\x00\x00\x04'
- 0x000c http_get_header 0x0003 0x0200
- b'Cookie'
- 0x000d http_post_header 0x0003 0x0200
- b'&Content-Type: application/octet-stream'
- b'id'
- 0x0036 HostHeader 0x0003 0x0080 (NULL ...)
- 0x0032 UsesCookies 0x0001 0x0002 1
- 0x0023 proxy_type 0x0001 0x0002 2 IE settings
- 0x003a 0x0003 0x0080 '\x00\x04'
- 0x0039 0x0003 0x0080 '\x00\x04'
- 0x0037 0x0001 0x0002 0
- 0x0028 killdate 0x0002 0x0004 0
- 0x0029 textSectionEnd 0x0002 0x0004 0
- 0x002b process-inject-start-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002c process-inject-use-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002d process-inject-min_alloc 0x0002 0x0004 0
- 0x002e process-inject-transform-x86 0x0003 0x0100 (NULL ...)
- 0x002f process-inject-transform-x64 0x0003 0x0100 (NULL ...)
- 0x0035 process-inject-stub 0x0003 0x0010 '2ÍAíð\x81\x0c[_I\x8eßG1Ìm'
- 0x0033 process-inject-execute 0x0003 0x0080 '\x01\x02\x03\x04'
- 0x0034 process-inject-allocation-method 0x0001 0x0002 0
Advertisement
Add Comment
Please, Sign In to add comment