ExecuteMalware

2021-07-22 Hancitor IOCs

Jul 22nd, 2021
16,418
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.02 KB | None | 0 0
  1. THREAT IDENTIFICATION: HANCITOR / FICKER STEALER / COBALT STRIKE
  2.  
  3. HANCITOR BUILD NUMBER
  4. BUILD=2207_xwpi67
  5.  
  6. SUBJECTS OBSERVED
  7. You got invoice from DocuSign Electronic Service
  8. You got invoice from DocuSign Electronic Signature Service
  9. You got invoice from DocuSign Service
  10. You got invoice from DocuSign Signature Service
  11. You got notification from DocuSign Electronic Service
  12. You got notification from DocuSign Electronic Signature Service
  13. You got notification from DocuSign Service
  14. You got notification from DocuSign Signature Service
  15. You received invoice from DocuSign Electronic Service
  16. You received invoice from DocuSign Electronic Signature Service
  17. You received invoice from DocuSign Service
  18. You received invoice from DocuSign Signature Service
  19. You received notification from DocuSign Electronic Service
  20. You received notification from DocuSign Electronic Signature Service
  21. You received notification from DocuSign Service
  22. You received notification from DocuSign Signature Service
  23.  
  24. SENDERS OBSERVED
  25.  
  26. MALDOC PROXY DISTRIBUTION URLS
  27. http://feedproxy.google.com/~r/ayrhs/~3/S-yTrf1uOo0/totter.php
  28. http://feedproxy.google.com/~r/cmdakn/~3/uoFf178aYac/elliptical.php
  29. http://feedproxy.google.com/~r/dgikzcnor/~3/depn2WJFsvs/predesigned.php
  30. http://feedproxy.google.com/~r/dprtbwpc/~3/pHTHay1Iyt0/grumpy.php
  31. http://feedproxy.google.com/~r/ebsuejssfi/~3/I_DXRad9XWM/verve.php
  32. http://feedproxy.google.com/~r/edcpnihcbt/~3/AFl4Gp6Bx3Y/delftware.php
  33. http://feedproxy.google.com/~r/ewzfasb/~3/TOQZu5H4GMI/decorating.php
  34. http://feedproxy.google.com/~r/hijiy/~3/sCjdavfvXsE/sinus.php
  35. http://feedproxy.google.com/~r/hrkgwqqtkoi/~3/PVYN0GNVBT0/scarecrow.php
  36. http://feedproxy.google.com/~r/ifytrzcypuu/~3/uxVujiVWgZY/peptide.php
  37. http://feedproxy.google.com/~r/iwapvoqg/~3/hfwKQfHNFJc/
  38. http://feedproxy.google.com/~r/jfgdoxqfq/~3/POEbYBEVmB0/
  39. http://feedproxy.google.com/~r/kylstdr/~3/kWt5v9NSjYY/undeceive.php
  40. http://feedproxy.google.com/~r/lavbqitdnbk/~3/Xnq66LBnOC4/sybarite.php
  41. http://feedproxy.google.com/~r/mowlmezp/~3/Vjj0go84O6w/autograph.php
  42. http://feedproxy.google.com/~r/mvjmyhv/~3/qaokC6dycZU/insulting.php
  43. http://feedproxy.google.com/~r/nagalfvoqgs/~3/N7y4kJwz_bU/continuing.php
  44. http://feedproxy.google.com/~r/nylmfk/~3/WQQLRgDLEXg/lubrication.php
  45. http://feedproxy.google.com/~r/pvqhnlp/~3/AMOYecAhYXc/rationalisation.php
  46. http://feedproxy.google.com/~r/pznuiidxa/~3/qvDO2lSjx4U/spellbind.php
  47. http://feedproxy.google.com/~r/rqskiat/~3/VRsE7WYwpEY/pregant.php
  48. http://feedproxy.google.com/~r/tjvngraagv/~3/UiWP1saD5Ec/narrow.php
  49. http://feedproxy.google.com/~r/vgbiwlr/~3/M8EKXahjplk/
  50. http://feedproxy.google.com/~r/vvoyowskbaz/~3/qaokC6dycZU/insulting.php
  51. http://feedproxy.google.com/~r/xeaeloijs/~3/s2AhoMvK-1U/
  52. http://feedproxy.google.com/~r/xeaeloijs/~3/s2AhoMvK-1U/scarcity.php
  53. http://feedproxy.google.com/~r/xkabdkksu/~3/lv8sJhvfER8/secede.php
  54. http://feedproxy.google.com/~r/xnaxhtzfbjp/~3/bY13LNDdYX8/meek.php
  55. http://feedproxy.google.com/~r/xogbt/~3/4zT14SDzhjw/existentialism.php
  56. http://feedproxy.google.com/~r/ymxms/~3/depn2WJFsvs/predesigned.php
  57. http://feedproxy.google.com/~r/zetxvxtiqrc/~3/3nxokZR2ng0/darn.php
  58. http://feedproxy.google.com/~r/zrgdjrcdzkm/~3/bAf7Su0FF8s/tens.php
  59.  
  60. MALDOC REDIRECT DOWNLOAD URLS
  61. http://alertas.jornadatrabalho.com.br/decorating.php
  62. http://likizoa-dumaszak.jornadatrabalho.com.br/lubrication.php
  63. http://likizoa-mge.jornadatrabalho.com.br/narrow.php
  64. http://likizoa-pedrotc.jornadatrabalho.com.br/tens.php
  65. http://likizoa-tac.jornadatrabalho.com.br/rationalisation.php
  66. http://onyx-medical.com/secede.php
  67. http://www.howtogethimbackpermanently.com/pregant.php
  68. http://www.howtogethimbackpermanently.com/totter.php
  69. http://www.howtogethimbackpermanently.com/verve.php
  70. https://d9tvsolutions.com/darn.php
  71. https://kalaaag.000webhostapp.com/elliptical.php
  72. https://kalaaag.000webhostapp.com/meek.php
  73. https://kitchenup.de/predesigned.php
  74. https://mailer.srkcommunication.biz/autograph.php
  75. https://mitarmilan.com/undeceive.php
  76. https://ndot.touchmediahost.com/continuing.php
  77. https://ndot.touchmediahost.com/insulting.php
  78. https://ndot.touchmediahost.com/spellbind.php
  79. https://service.easytrace.mn/grumpy.php
  80. https://sp.ncre.org.in/scarcity.php
  81. https://www.guongnoithat.com/singapore.php
  82. https://www.guongnoithat.com/unsinkable.php
  83. https://www.ivrvirtualsolutions.com/stinginess.php
  84.  
  85. 000webhostapp.com
  86. d9tvsolutions.com
  87. easytrace.mn
  88. guongnoithat.com
  89. howtogethimbackpermanently.com
  90. ivrvirtualsolutions.com
  91. jornadatrabalho.com.br
  92. kitchenup.de
  93. mitarmilan.com
  94. ncre.org.in
  95. onyx-medical.com
  96. srkcommunication.biz
  97. touchmediahost.com
  98.  
  99. MALDOC FILE HASHES
  100. 1664a21b31abc809b41ef04bef2b83d3
  101. 3a73e0e78a5f63c8aee74ad597723434
  102. 4942f8e35bde6d5e85139c848a8285c0
  103. 53f2b97c4464d8b58afa7077408dff3c
  104. 5bd6495094ee5223cab904288018b3ff
  105. a40f92fde968f6e24c723e31ba5ffefc
  106. b11b59f8b566048f4d57962eea548076
  107. c335b3485e963c1e0c058002470af76e
  108. d07e0a1c4e59611abb0d5ead73a8d2f2
  109. d1519ed8a42a01cfad099b7c3baa9f2b
  110. e28f4975d4f9b4169b94ac8e1e7a9532
  111. f9839343568f8220218732612ce7dbd3
  112.  
  113. HANCITOR PAYLOAD FILE HASH
  114. omsh.dll
  115. 7348620f737ec1b0997cae7548344f2c
  116.  
  117. HANCITOR C2
  118. http://aidgodown.ru/8/forum.php
  119. http://relifleappin.ru/8/forum.php
  120. http://tholeferli.com/8/forum.php
  121.  
  122. FICKER STEALER DOWNLOAD URL
  123. http://s0lom0n.ru/7hsjfd9w4refsd.exe
  124.  
  125. FICKER STEALER FILE HASH
  126. 7hsjfd9w4refsd.exe
  127. 270c3859591599642bd15167765246e3
  128.  
  129. FICKER STEALER C2
  130. http://pospvisis.com
  131.  
  132. COBALT STRIKE STAGER DOWNLOAD URLS
  133. http://s0lom0n.ru/2207.bin
  134. http://s0lom0n.ru/2207s.bin
  135.  
  136. COBALT STRIKE STAGER FILE HASHES
  137. 2207.bin
  138. aeadfa6eeab3d9c52ebff8c6aa41a833
  139.  
  140. 2207s.bin
  141. 765495a185b509ebbc3c263e0a421e18
  142.  
  143. COBALT STRIKE BEACON DOWNLOAD URL
  144. http://23.239.67.26/jVRJ
  145.  
  146. COBALT STRIKE BEACON FILE HASH
  147. jVRJ
  148. 3cb6a83bc0314055c2672d5ba066bce7
  149.  
  150. COBALT STRIKE C2
  151. http://23.239.67.26/j.ad
  152.  
  153. Additional Cobalt Strike URLs from strings in memory:
  154. https://23.239.67.26/i9Vd
  155. https://23.239.67.26/ga.js
  156.  
  157.  
  158. COBALT STRIKE BEACON CONFIG (extracted using Didier Stevens' 1768 Python script)
  159. File: jVRJ
  160. xorkey(chain): 0xbde0b35e
  161. length: 0x00033400
  162. payloadType: 0x10014fc2
  163. payloadSize: 0x00000000
  164. intxorkey: 0x00000000
  165. id2: 0x00000000
  166. Config found: xorkey b'.' 0x00030220 0x00033400
  167. 0x0001 payload type 0x0001 0x0002 0 windows-beacon_http-reverse_http
  168. 0x0002 port 0x0001 0x0002 80
  169. 0x0003 sleeptime 0x0002 0x0004 60000
  170. 0x0004 maxgetsize 0x0002 0x0004 1048576
  171. 0x0005 jitter 0x0001 0x0002 0
  172. 0x0007 publickey 0x0003 0x0100 30819f300d06092a864886f70d010101050003818d0030818902818100a738cde75f1fbb1c18646c377e03016b162b12ba72bdf7dc36b4cd2e4e9bae12205a95c26170bf908105ad7fa4bbccfa798632261bed9870f975f20794e1fe499523d71f08a56cae0315bfde3d6c8a16386b03b7a6551aa1336d50325a3500db27d78ad8fd13b6a73b9fb7c3fb4d7a088e323f07618656ecd83595fa5f823613020301000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
  173. 0x0008 server,get-uri 0x0003 0x0100 '23.239.67.26,/j.ad'
  174. 0x0043 0x0001 0x0002 0
  175. 0x0044 0x0002 0x0004 4294967295
  176. 0x0045 0x0002 0x0004 4294967295
  177. 0x0046 0x0002 0x0004 4294967295
  178. 0x000e SpawnTo 0x0003 0x0010 (NULL ...)
  179. 0x001d spawnto_x86 0x0003 0x0040 '%windir%\\syswow64\\rundll32.exe'
  180. 0x001e spawnto_x64 0x0003 0x0040 '%windir%\\sysnative\\rundll32.exe'
  181. 0x001f CryptoScheme 0x0001 0x0002 0
  182. 0x001a get-verb 0x0003 0x0010 'GET'
  183. 0x001b post-verb 0x0003 0x0010 'POST'
  184. 0x001c HttpPostChunk 0x0002 0x0004 0
  185. 0x0025 license-id 0x0002 0x0004 0
  186. 0x0026 bStageCleanup 0x0001 0x0002 0
  187. 0x0027 bCFGCaution 0x0001 0x0002 0
  188. 0x0009 useragent 0x0003 0x0100 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; Avant Browser)'
  189. 0x000a post-uri 0x0003 0x0040 '/submit.php'
  190. 0x000b Malleable_C2_Instructions 0x0003 0x0100 '\x00\x00\x00\x04'
  191. 0x000c http_get_header 0x0003 0x0200
  192. b'Cookie'
  193. 0x000d http_post_header 0x0003 0x0200
  194. b'&Content-Type: application/octet-stream'
  195. b'id'
  196. 0x0036 HostHeader 0x0003 0x0080 (NULL ...)
  197. 0x0032 UsesCookies 0x0001 0x0002 1
  198. 0x0023 proxy_type 0x0001 0x0002 2 IE settings
  199. 0x003a 0x0003 0x0080 '\x00\x04'
  200. 0x0039 0x0003 0x0080 '\x00\x04'
  201. 0x0037 0x0001 0x0002 0
  202. 0x0028 killdate 0x0002 0x0004 0
  203. 0x0029 textSectionEnd 0x0002 0x0004 0
  204. 0x002b process-inject-start-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
  205. 0x002c process-inject-use-rwx 0x0001 0x0002 64 PAGE_EXECUTE_READWRITE
  206. 0x002d process-inject-min_alloc 0x0002 0x0004 0
  207. 0x002e process-inject-transform-x86 0x0003 0x0100 (NULL ...)
  208. 0x002f process-inject-transform-x64 0x0003 0x0100 (NULL ...)
  209. 0x0035 process-inject-stub 0x0003 0x0010 '2ÍAíð\x81\x0c[_I\x8eßG1Ìm'
  210. 0x0033 process-inject-execute 0x0003 0x0080 '\x01\x02\x03\x04'
  211. 0x0034 process-inject-allocation-method 0x0001 0x0002 0
  212. 0x0000
  213.  
  214.  
Advertisement
Add Comment
Please, Sign In to add comment