Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Hancitor

Hancitor

Hancitor is a downloader that has been used byPony and other information stealing malware.[1][2]

ID: S0499
Associated Software: Chanitor
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 12 August 2020
Last Modified: 25 April 2025

Associated Software Descriptions

NameDescription
Chanitor

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Hancitor has added Registry Run keys to establish persistence.[2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Hancitor has used PowerShell to execute commands.[2]

EnterpriseT1140Deobfuscate/Decode Files or Information

Hancitor has decoded Base64 encoded URLs to insert a recipient’s name into the filename of the Word document.Hancitor has also extracted executables from ZIP files.[1][2]

EnterpriseT1070.004Indicator Removal:File Deletion

Hancitor has deleted files using the VBAkill function.[2]

EnterpriseT1105Ingress Tool Transfer

Hancitor has the ability to download additional files from C2.[1]

EnterpriseT1106Native API

Hancitor has usedCallWindowProc andEnumResourceTypesA to interpret and execute shellcode.[2]

EnterpriseT1027Obfuscated Files or Information

Hancitor has used Base64 to encode malicious links.[1]

.015Compression

Hancitor has delivered compressed payloads in ZIP files to victims.[2]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Hancitor has been delivered via phishing emails with malicious attachments.[2]

.002Phishing:Spearphishing Link

Hancitor has been delivered via phishing emails which contained malicious links.[1]

EnterpriseT1218.012System Binary Proxy Execution:Verclsid

Hancitor has used verclsid.exe to download and execute a malicious script.[3]

EnterpriseT1204.001User Execution:Malicious Link

Hancitor has relied upon users clicking on a malicious link delivered through phishing.[1]

.002User Execution:Malicious File

Hancitor has used malicious Microsoft Word documents, sent via email, which prompted the victim to enable macros.[2]

EnterpriseT1497Virtualization/Sandbox Evasion

Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp