ExecuteMalware

2021-02-25 Hancitor with Cobalt Strike IOCs

Feb 25th, 2021
5,752
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.05 KB | None | 0 0
  1. THREAT IDENTIFICATION: HANCITOR
  2.  
  3. HANCITOR BUILD
  4. BUILD=2502_ser3402
  5.  
  6. SUBJECTS OBSERVED
  7. You got invoice from DocuSign Electronic Service
  8. You got invoice from DocuSign Service
  9. You got notification from DocuSign Service
  10. You got notification from DocuSign Signature Service
  11. You received invoice from DocuSign Electronic Signature Service
  12.  
  13. SENDERS OBSERVED
  14.  
  15. MALDOC LANDING PAGE URLS
  16. https://docs.google.com/document/d/e/2PACX-1vQ_iB254FLZwex_SMtN1bYyqc9cAwxV51Az9MCiJh0yrgprVjrxalbkw4mEgagakJfve6XTSf3fyP-m/pub
  17. https://docs.google.com/document/d/e/2PACX-1vQ_UEesgTo9XOh6sV3jReYaUKNkrZOcPsd5-jloT40W2EMSMjF1fa0mSt34KjOHD9SbIYdYmPpzDX0H/pub
  18. https://docs.google.com/document/d/e/2PACX-1vQeZKhFLekudqH3SSwsm2cc_X4AMMZb7KSrHqL5EZ0I3JHODeQKm7ap34GwWRRUzraQShIhiwPBCbIJ/pub
  19. https://docs.google.com/document/d/e/2PACX-1vRbBTctItvpIsRVS1B6G7eS6WHFcJZvk2jWAwdZ0OV-uAoHOfqR_he9BAIF_rI5uDC891PzpnOLSdMm/pub
  20. https://docs.google.com/document/d/e/2PACX-1vRiZWs38eBJl6meJPSFY2n8C25-FdvSRAhpBf-cUDDYHbCGCHhKdJYJY235mwYdsBLzJHJZlYZgLciM/pub
  21. https://docs.google.com/document/d/e/2PACX-1vS2xXZgf6hNt6zT8z90MneOAAb1um1Er7Cwe6nnlWbyfVDzomOWwNCB32YJmvfELTrP0eE7lZo0iYYu/pub
  22. https://docs.google.com/document/d/e/2PACX-1vT03x_9-U0Q7CUikEnNeebwSj6e8ZSmcaOdDoAMlfueLiWEL9pKY67j14KD-CyzP_n20bvpCg0ZZgyr/pub
  23. https://docs.google.com/document/d/e/2PACX-1vTghdcY921fCwuju7Y7Htf52IvtbdCo1uxKs5JBQErhrIO84GMbYDK7ScCw8zTr4emwvpiglNd_MiHa/pub
  24. https://docs.google.com/document/d/e/2PACX-1vTudh0fa8ddJIUHwzvFNFCeIAHQ4GSRi1l07Rf0PcaNlNi2afpbp4GhC23HvbH3mrKg8_TifpPrhLGz/pub
  25.  
  26. MALDOC DISTRIBUTION URLS
  27. https://4spoiltboyz.co.za/magnet.php
  28. https://4spoiltboyz.co.za/rebus.php
  29. https://buahpinggang.my/driftage.php
  30. https://cocam.com.br/app/webroot/imagens/chamadas/recalcitrant.php
  31. https://wp.webmavens.com/wp-content/awhirl.php
  32.  
  33. 4spoiltboyz.co.za
  34. buahpinggang.my
  35. cocam.com.br
  36. webmavens.com
  37.  
  38. HANCITOR MALDOC FILE NAMES
  39. 0225_6931906569242.doc
  40. fc95d6794c9551d41ca64699dba7831e
  41.  
  42. 0225_45868432836132.doc
  43. e675dc56b3a2044fcdac9f36fd48ad0e
  44.  
  45. 0225_4384219621562.doc
  46. 7903732249da4ff1cfb1c05a39570d2e
  47.  
  48. HANCITOR MALDOC FILE HASHES
  49. 7903732249da4ff1cfb1c05a39570d2e
  50. e675dc56b3a2044fcdac9f36fd48ad0e
  51. fc95d6794c9551d41ca64699dba7831e
  52.  
  53. HANCITOR PAYLOAD FILE HASH
  54. Static.dll
  55. 1272d3d1b2e63bf3a7111200957f4fe6
  56.  
  57. HANCITOR C2
  58. http://speritentz.com/8/forum.php
  59. http://afternearde.ru/8/forum.php
  60. http://counivicop.ru/8/forum.php
  61.  
  62. FICKER STEALER PAYLOAD URLS
  63. http://wouatiareves.ru/6hy67438ue.exe
  64.  
  65. FICKER STEALER FILE HASH
  66. 6hy67438ue.exe
  67. 77be0dd6570301acac3634801676b5d7
  68.  
  69. FICKER STEALER C2
  70. http://sweyblidian.com
  71.  
  72. COBALT STRIKE PAYLOAD URLS
  73. http://wouatiareves.ru/2502.bin
  74. http://wouatiareves.ru/2502s.bin
  75.  
  76. COBALT STRIKE FILE HASHES
  77. 2502.bin
  78. a62f0f63412325dbdf7827847c00b94f
  79.  
  80. 2502s.bin
  81. 639c23bc846ab4ed33d036be7119f336
  82.  
  83. COBALT STRIKE TRAFFIC
  84. http://64.52.168.229:8080/7ySY
  85. http://64.52.168.229:8080/ptj
  86.  
Advertisement
Add Comment
Please, Sign In to add comment