system
1
Source: 2022-02-01 – Hancitor (Chanitor/MAN1/Moskalvzapoe/TA511) infection with Cobalt Strike – cobaltstrike.net
2022-02-01 (TUESDAY) – HANCITOR (CHANITOR/MAN1/MOSKALVZAPOE/TA511) INFECTION WITH COBALT STRIKE
ASSOCIATED FILES:
2022-02-01-IOCs-for-Hancitor-and-Cobalt-Strike.txt.zip 3.2 kB (3,263 bytes)
2022-02-01-Hancitor-malspam-33-examples.zip 79.1 kB (79,067 bytes)
2022-02-01-Hancitor-infection-with-Cobalt-Strike.pcap.zip 2.2 MB (2,227,550 bytes)
2022-02-01-Hancitor-malware-and-artifacts.zip 6.4 MB (6,434,433 bytes)
NOTES:
All zip archives on this site are password-protected. If you don’t know the password, see the “about” page of this website.
IMAGES
Shown above: Screenshot from one of the emails.
Shown above: Link from the email returned a Word doc.
Shown above: Screenshot of the Hancitor Word doc.
Shown above: Batch file and Hancitor DLL (moexx.bin) on the infected Windows host.
Shown above: Traffic from the infection filtered in Wireshark.
Start the discussion in our Community at forum.cobaltstrike.net.
Source link