Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- THREAT IDENTIFICATION: HANCITOR / FICKER STEALER / COBALT STRIKE
- HANCITOR BUILD NUMBER
- BUILD=0308_spnv5
- SUBJECTS OBSERVED
- You got invoice from DocuSign Electronic Service
- You got invoice from DocuSign Electronic Signature Service
- You got invoice from DocuSign Service
- You got invoice from DocuSign Signature Service
- You got notification from DocuSign Electronic Service
- You got notification from DocuSign Electronic Signature Service
- You got notification from DocuSign Service
- You got notification from DocuSign Signature Service
- You received invoice from DocuSign Electronic Service
- You received invoice from DocuSign Electronic Signature Service
- You received invoice from DocuSign Service
- You received invoice from DocuSign Signature Service
- You received notification from DocuSign Electronic Service
- You received notification from DocuSign Electronic Signature Service
- You received notification from DocuSign Service
- You received notification from DocuSign Signature Service
- SENDERS OBSERVED
- MALDOC PROXY DISTRIBUTION URLS
- feedproxy.google.com/~r/llyvx/~3/1HPbx2QTN34/big.php
- feedproxy.google.com/~r/pnuihnlrne/~3/fFNPamI_rn4/stillbirth.php
- feedproxy.google.com/~r/tulwjeay/~3/rMQGXOVy-3U/quizzicalness.php
- feedproxy.google.com/~r/gepgyjncs/~3/WgltbaxkTK0/dame.php
- feedproxy.google.com/~r/cglvzs/~3/14in7hXkVpk/lombardic.php
- feedproxy.google.com/~r/jnkdl/~3/c0JU-e5KhfU/teachable.php
- feedproxy.google.com/~r/obqzuacvxdu/~3/YjNhfl62jyM/unlabelled.php
- feedproxy.google.com/~r/yjpfbsue/~3/EsChJZogZGs/tractability.php
- feedproxy.google.com/~r/pccktuvx/~3/B6ffek3xi84/unsophisticated.php
- feedproxy.google.com/~r/mnqwvrz/~3/NeQSL1PG4cw/hitherto.php
- feedproxy.google.com/~r/hkqsdntbyym/~3/ATRcrg7bF64/transistor.php
- MALDOC REDIRECT DOWNLOAD URLS
- https://bridgeroad.maverickpreviews.com/quizzicalness.php
- https://demo.sms.uproducts.in/lombardic.php
- https://nicelyeg.com/stillbirth.php
- https://thiagoribeirokungfu.com/hitherto.php
- https://www.cutting-edge.in/unlabelled.php
- https://www.mimejorprecioford.com/transistor.php
- cutting-edge.in
- maverickpreviews.com
- mimejorprecioford.com
- nicelyeg.com
- thiagoribeirokungfu.com
- uproducts.in
- MALDOC FILE HASHES
- 16885d6a4357b2589c61fbc9a2c725a2
- 1b64dc1f33508390eedf55d1c7df9a8b
- 32900dbc203bf7aa955788b7c7749955
- 52ee14e0cb8aebde975c3b269494fc37
- 9d056cda0c3873efb5ac0f56c3028ab1
- HANCITOR PAYLOAD FILE HASH
- ier.dll
- d7c87a735968d424d5c0aa2794d23657
- HANCITOR C2
- http://arviskeist.ru/8/forum.php
- http://priekornat.com/8/forum.php
- http://stionsomi.ru/8/forum.php
- FICKER STEALER DOWNLOAD URL
- http://fiom65pre.ru/7sdjhui32sof.exe
- FICKER STEALER FILE HASH
- 7sdjhui32sof.exe
- 270c3859591599642bd15167765246e3
- FICKER STEALER C2
- http://pospvisis.com
- COBALT STRIKE STAGER DOWNLOAD URLS
- http://fiom65pre.ru/0308.bin
- http://fiom65pre.ru/0308s.bin
- COBALT STRIKE STAGER FILE HASHES
- 0308.bin
- 3a70e1933703eec9d17e92328d558854
- 0308s.bin
- 6ebc14bf77c7f58d680b13af884fee23
- COBALT STRIKE BEACON DOWNLOAD URL
- http://45.176.188.217/Kbv9
- https://45.176.188.217/YcPP
- COBALT STRIKE BEACON FILE HASH
- Kbv9
- 017c19c9ef76a8ce0f89468dc7cc57d5
- YcPP
- c756344c9374efac7a35c8345388346f
- COBALT STRIKE C2
- http://45.176.188.217/g.pixel
- https://45.176.188.217/updates.rss
- COBALT STRIKE POST URI
- http://45.176.188.217/submit.php?id=483523938
- COBALT STRIKE STRIKE BEACON CONFIGS (from Didier Stevens' 1768 tool)
- Kbv9 Beacon Config
- 36b4cd2e4e9bae12205a95c26170bf908105ad7fa4bbccfa798632261bed9870f975f20794e1fe499523d71f08a56cae0315bfde3d6c8a16386b03b7a6551aa1336d50325a3500db27d78ad8fd13b6a73b9fb7c3fb4d7a088e323f07618656ecd83595fa5f823613020301000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
- 0x0008 server,get-uri 0x0003 0x0100 '45.176.188.217,/g.pixel'
- 0x0043 0x0001 0x0002 0
- 0x0044 0x0002 0x0004 4294967295
- 0x0045 0x0002 0x0004 4294967295
- 0x0046 0x0002 0x0004 4294967295
- 0x000e SpawnTo 0x0003 0x0010 (NULL ...)
- 0x001d spawnto_x86 0x0003 0x0040 '%windir%\\syswow64\\rundll32.exe'
- 0x001e spawnto_x64 0x0003 0x0040 '%windir%\\sysnative\\rundll32.exe'
- 0x001f CryptoScheme 0x0001 0x0002 0
- 0x001a get-verb 0x0003 0x0010 'GET'
- 0x001b post-verb 0x0003 0x0010 'POST'
- 0x001c HttpPostChunk 0x0002 0x0004 0
- 0x0025 license-id 0x0002 0x0004 0
- 0x0026 bStageCleanup 0x0001 0x0002 0
- 0x0027 bCFGCaution 0x0001 0x0002 0
- 0x0009 useragent 0x0003 0x0100 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSCOM)'
- 0x000a post-uri 0x0003 0x0040 '/submit.php'
- 0x000b Malleable_C2_Instructions 0x0003 0x0100 '\x00\x00\x00\x04'
- 0x000c http_get_header 0x0003 0x0200
- b'Cookie'
- 0x000d http_post_header 0x0003 0x0200
- b'&Content-Type: application/octet-stream'
- b'id'
- 0x0036 HostHeader 0x0003 0x0080 (NULL ...)
- 0x0032 UsesCookies 0x0001 0x0002 1
- 0x0023 proxy_type 0x0001 0x0002 2 IE settings
- 0x003a 0x0003 0x0080 '\x00\x04'
- 0x0039 0x0003 0x0080 '\x00\x04'
- 0x0037 0x0001 0x0002 0
- 0x0028 killdate 0x0002 0x0004 0
- 0x0029 textSectionEnd 0x0002 0x0004 0
- 0x002b process-inject-start-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002c process-inject-use-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002d process-inject-min_alloc 0x0002 0x0004 0
- 0x002e process-inject-transform-x86 0x0003 0x0100 (NULL ...)
- 0x002f process-inject-transform-x64 0x0003 0x0100 (NULL ...)
- 0x0035 process-inject-stub 0x0003 0x0010 '2ÍAíð\x81\x0c[_I\x8eßG1Ìm'
- 0x0033 process-inject-execute 0x0003 0x0080 '\x01\x02\x03\x04'
- 0x0034 process-inject-allocation-method 0x0001 0x0002 0
- 0x0000
- YcPP Beacon Config
- File: YcPP
- xorkey(chain): 0x54811670
- length: 0x00033400
- payloadType: 0x10014fc2
- payloadSize: 0x00000000
- intxorkey: 0x00000000
- id2: 0x00000000
- Config found: xorkey b'.' 0x00030220 0x00033400
- 0x0001 payload type 0x0001 0x0002 8 windows-beacon_https-reverse_https
- 0x0002 port 0x0001 0x0002 443
- 0x0003 sleeptime 0x0002 0x0004 60000
- 0x0004 maxgetsize 0x0002 0x0004 1048576
- 0x0005 jitter 0x0001 0x0002 0
- 0x0007 publickey 0x0003 0x0100 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
- 0x0008 server,get-uri 0x0003 0x0100 '45.176.188.217,/updates.rss'
- 0x0043 0x0001 0x0002 0
- 0x0044 0x0002 0x0004 4294967295
- 0x0045 0x0002 0x0004 4294967295
- 0x0046 0x0002 0x0004 4294967295
- 0x000e SpawnTo 0x0003 0x0010 (NULL ...)
- 0x001d spawnto_x86 0x0003 0x0040 '%windir%\\syswow64\\rundll32.exe'
- 0x001e spawnto_x64 0x0003 0x0040 '%windir%\\sysnative\\rundll32.exe'
- 0x001f CryptoScheme 0x0001 0x0002 0
- 0x001a get-verb 0x0003 0x0010 'GET'
- 0x001b post-verb 0x0003 0x0010 'POST'
- 0x001c HttpPostChunk 0x0002 0x0004 0
- 0x0025 license-id 0x0002 0x0004 0
- 0x0026 bStageCleanup 0x0001 0x0002 0
- 0x0027 bCFGCaution 0x0001 0x0002 0
- 0x0009 useragent 0x0003 0x0100 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; MANM; MANM)'
- 0x000a post-uri 0x0003 0x0040 '/submit.php'
- 0x000b Malleable_C2_Instructions 0x0003 0x0100 '\x00\x00\x00\x04'
- 0x000c http_get_header 0x0003 0x0200
- b'Cookie'
- 0x000d http_post_header 0x0003 0x0200
- b'&Content-Type: application/octet-stream'
- b'id'
- 0x0036 HostHeader 0x0003 0x0080 (NULL ...)
- 0x0032 UsesCookies 0x0001 0x0002 1
- 0x0023 proxy_type 0x0001 0x0002 2 IE settings
- 0x003a 0x0003 0x0080 '\x00\x04'
- 0x0039 0x0003 0x0080 '\x00\x04'
- 0x0037 0x0001 0x0002 0
- 0x0028 killdate 0x0002 0x0004 0
- 0x0029 textSectionEnd 0x0002 0x0004 0
- 0x002b process-inject-start-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002c process-inject-use-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
- 0x002d process-inject-min_alloc 0x0002 0x0004 0
- 0x002e process-inject-transform-x86 0x0003 0x0100 (NULL ...)
- 0x002f process-inject-transform-x64 0x0003 0x0100 (NULL ...)
- 0x0035 process-inject-stub 0x0003 0x0010 '2ÍAíð\x81\x0c[_I\x8eßG1Ìm'
- 0x0033 process-inject-execute 0x0003 0x0080 '\x01\x02\x03\x04'
- 0x0034 process-inject-allocation-method 0x0001 0x0002 0
- 0x0000
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement