ASSOCIATED FILES:
NOTES:

Shown above: Screen shot from an example of malspam pushing Hancitor.

Shown above: Screenshot from one of the Google Docs pages leading to the spreadsheet.

Shown above: Screenshot from one of the Excel files downloaded through the Google Docs pages.

Shown above: Traffic from an infection filtered in Wireshark.

Shown above: The initial Hancitor EXE.

Shown above: Registry update to make the Hancitor EXE persistent.

Shown above: Malware binaries in the infected user's AppData\Local\Temp directory.

Shown above: This appeared after the Cobalt Strike activity started.
Click here to return to the main page.