MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab2a474c3fd276095d7db5d78df356a572b1eee397ef1977facd8df214db3db0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Hancitor


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: ab2a474c3fd276095d7db5d78df356a572b1eee397ef1977facd8df214db3db0
SHA3-384 hash: d498847b841fbab31cdf00b5b79bae6a3e6bd079160a914b1bc08de4e0c731af24efda1012555ddb616e3d516a8ef6d6
SHA1 hash: 6a2426de100f63c884a54ed12013e3094e6fe10b
MD5 hash: a2dd642315f3cc6b44241c31ec964ea3
humanhash: blue-south-table-artist
File name:ab2a474c3fd276095d7db5d78df356a572b1eee397ef1977facd8df214db3db0
Download: download sample
Signature Hancitor
File size:20'992 bytes
First seen:2022-03-20 19:55:14 UTC
Last seen:2022-03-20 21:46:38 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 57265d838ef6737ecad7f941f2f02016 (6 x Hancitor)
ssdeep 384:WT6soQ2wAZV+1U8iDqnzXu9BCLQcOCVgrC:MiWAZV+YDqzXop8gr
TLSH T1D692AE43A8B09071F187107D2464DE37DEBDE81031E99D029617E9870D98BA6FF3E287
Reporter _ilbaroni
Tags:dll Hancitor

Intelligence


File Origin
# of uploads :
2
# of downloads :
616
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
hancitor magniber packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Hancitor
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to inject threads in other processes
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Yara detected Hancitor
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Hancitor
Status:
Malicious
First seen:
2021-11-28 06:39:00 UTC
File Type:
PE (Dll)
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
hancitor
Result
Malware family:
hancitor
Score:
  10/10
Tags:
family:hancitor botnet:2311_nsdir
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Looks up external IP address via web service
Blocklisted process makes network request
Malware Config
C2 Extraction:
http://templogio.com/9/forum.php
http://johommeract.ru/9/forum.php
http://amesibiquand.ru/9/forum.php
Unpacked files
SH256 hash:
ab2a474c3fd276095d7db5d78df356a572b1eee397ef1977facd8df214db3db0
MD5 hash:
a2dd642315f3cc6b44241c31ec964ea3
SHA1 hash:
6a2426de100f63c884a54ed12013e3094e6fe10b
Detections:
win_hancitor_auto
Malware family:
Hancitor
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Hancitor
Author:threathive
Description:Hancitor Payload
Rule name:win_hancitor_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.hancitor.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments