2022-02-01 - Hancitor (Chanitor/MAN1/Moskalvzapoe/TA511) infection with Cobalt Strike

Source: 2022-02-01 – Hancitor (Chanitor/MAN1/Moskalvzapoe/TA511) infection with Cobalt Strike – cobaltstrike.net


2022-02-01 (TUESDAY) – HANCITOR (CHANITOR/MAN1/MOSKALVZAPOE/TA511) INFECTION WITH COBALT STRIKE

ASSOCIATED FILES:

  • 2022-02-01-IOCs-for-Hancitor-and-Cobalt-Strike.txt.zip 3.2 kB (3,263 bytes)
  • 2022-02-01-Hancitor-malspam-33-examples.zip 79.1 kB (79,067 bytes)
  • 2022-02-01-Hancitor-infection-with-Cobalt-Strike.pcap.zip 2.2 MB (2,227,550 bytes)
  • 2022-02-01-Hancitor-malware-and-artifacts.zip 6.4 MB (6,434,433 bytes)
  • NOTES:

  • All zip archives on this site are password-protected. If you don’t know the password, see the “about” page of this website.
  • IMAGES

    Shown above: Screenshot from one of the emails.

    Shown above: Link from the email returned a Word doc.

    Shown above: Screenshot of the Hancitor Word doc.

    Shown above: Batch file and Hancitor DLL (moexx.bin) on the infected Windows host.

    Shown above: Traffic from the infection filtered in Wireshark.

    Start the discussion in our Community at forum.cobaltstrike.net.


    Source link