Today’s diary reviews trends in recent malicious spam (malspam) pushing Hancitor.
Background: Malspam pushing Hancitor (also known as Chanitor or Tordal) is a long-running campaign. In recent months, we’ve often seen waves of Hancitor malspam 2 or 3 times each week. Infections from this malspam tend to follow predictable patterns, and have ended with Ursnif as the follow-up malware since the end of October 2018 (previously it had been Zeus Panda Banker).
Recent activity: After a wave of malspam on 2018-10-29, this campaign went silent, and we saw no new Hancitor malspam for one month. Last week on Thursday 2018-11-29, Hancitor malspam returned with changes to the macro code in the associated Word documents. Hancitor is still sending Ursnif as its follow-up malware.
Today’s diary reviews an infection from Hancitor malspam seen on Tuesday 2018-12-04.
The email template for Tuesday’s malspam was eFax-themed, which is something we’ve occasionally see from this campaign. No big surprises here. And the link to download a Word document follows the same pattern of ASCII characters at the end, where all characters after the = sign are an encoded string that represents the recipient’s email address. I’m still not sure how to decode these strings.
Below is an example of the email headers from one of the messages on Tuesday:
Received: from lenoxia.com ([18.104.22.168]) by [removed] for [removed]; Tue, 04 Dec 2018 15:38:56 +0000 (UTC) Date: Tue, 04 Dec 2018 08:40:58 -0700 MIME-Version: 1.0 X-Mailer: iPad Mail (11D169b) Content-Transfer-Encoding: 7bit Subject: This is an automatic eFax Notification Message-ID: From: "eFax, Inc." Content-Type: text/html; charset="utf-8" TO: [removed] Reply-To: "eFax"
At first glance, the downloaded Word document looks similar to those seen in previous waves of Hancitor malspam. Victims must enable macros to infect a vulnerable Windows host. However, the macros act noticeably different than before (more on that later).
Infection traffic follows the same patterns we’ve previously seen for Hancitor, except wotj additional infection traffic for Ursnif instead of Zeus Panda Banker. In this case, I also saw Tor traffic, which might be related to the Ursnif activity. An HTTP request to amalu[.]at returned an encoded binary about 2.2 MB in size, which matched a malware binary I found on the infected Windows host for Send Safe Enterprise (SSE) spambot malware. I also saw the UDP beaconing traffic associated with SSE spambot malware.
Forensics on the infected host
Unlike previous Hancitor Word docs, ever since Hancitor reappeared on 2018-11-29, the Word documents are noticeably larger, and they contain ASCII-based hex code that is decoded as two executable files dropped after enabling macros. These two executables are named werd.exe and wird.exe, and they’re dropped to the user’s AppDataRoaming directory. A folder also appeared in the AppDataRoaming directory with links copied from the desktop of my infected Windows host. I also saw folders named msohtmlclip and msohtmlclip1 that were created in the user’s AppDataLocalTemp directory.
Ursnif was made persistent through about 14MB of ASCII code stored as Windows registry entries. This is normal for Ursnif infections, and I’ve exported a copy of these registry entries so people can review them. See the link at the end of this dairy to access the data.
Finally, SSE spambot malware was stored in the user’s AppDataLocalTemp directory using random digits in the filename.
The following are indicators from an infected Windows host. Any malicious URLs, IP addresses, and domain names have been “de-fanged” to avoid any issues when viewing today’s diary.
URL from the malspam text to download the initial Word document:
- 47.89.18[.]253 port 80 – your365realestateoffice[.]com – GET /?[string of characters]=[string of characters representing recipient’s email address]
Hancitor infection traffic after enabling Word macros:
- port 80 – api.ipify.org – GET / (IP address check by the infected host, not inherently malicious)
- 191.101.20[.]16 port 80 – ninglarenlac[.]com – POST /4/forum.php
- 191.101.20[.]16 port 80 – ninglarenlac[.]com – POST /mlu/forum.php
- 191.101.20[.]16 port 80 – ninglarenlac[.]com – POST /d2/about.php
- 131.72.236[.]103 port 80 – todoemergencias[.]cl – GET /wp-includes/1
- 131.72.236[.]103 port 80 – todoemergencias[.]cl – GET /wp-includes/2
- 131.72.236[.]103 port 80 – todoemergencias[.]cl – GET /wp-includes/3
Ursnif infection traffic:
- 47.52.45[.]178 port 80 – api2.doter[.]at – GET /webstore/[long string]
- 47.52.45[.]178 port 80 – 47.52.45[.]178 – GET /favicon.ico
- 47.52.45[.]178 port 80 – beetfeetlife[.]bit – GET /webstore/[long string]
- 47.52.45[.]178 port 80 – beetfeetlife[.]bit – GET /jvassets/o1/s64.dat
Tor traffic seen after the initial Hancitor and Ursnif activity:
- various IP addresses over mostly port 80 – GET /tor/status-vote/current/consensus
- various IP addresses over mostly port 80 – GET /tor/server/fp/[long hex string]
- various IP addresses over port 443 – SSL/TLS traffic
Infected host retrieves SSE spambot malware:
- 46.163.119[.]217 port 80 – amalu[.]at – GET /wp-admin/includes/36s
UDP beacon caused by SSE spambot malware:
- 31.44.184[.]36 port 50012
Malware from an infected Windows host:
- File size: 458,240 bytes
- File description: Word doc downloaded form email link, doc has macro for Hancitor
- File name: invoice_530486.doc (random digits in the file name)
- File size: 114,690 bytes
- File description: Hancitor malware binary dropped by Word macro
- File location: C:Users[username]AppDataRoamingwerd.exe
- File size: 52,226 bytes
- File description: Hancitor-related executable dropped by Word macro
- File location: C:Users[username]AppDataRoamingwird.exe
- File size: 249,544 bytes
- File description: Ursnif executable retrieved by Hancitor-infected host
- File location: C:Users[username]AppDataLocalTempBNA4D6.tmp (random characters in the file name)
- File size: 2,163,976 bytes
- File description: Send Safe Enterprise (SSE) spambot malware
- File location: C:Users[username]AppDataLocalTemp1907751.exe (random digits in the file name)
3 email examples, a pcap of the infection traffic, and malware/artifacts associated with today’s diary can be found here.
brad [at] malware-traffic-analysis.net
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.