

12, 2021.ĭocuSign-spoofed emails are not new, nor are they limited to Hancitor. Currently, most waves of emails pushing Hancitor have used a DocuSign theme, and the average wave of Hancitor malspam looks like this one reported on Jan. Emails spoofing DocSign have been reported as early as October 2017, but the group behind Hancitor began more frequent use of DocuSign templates starting in October 2019. Hancitor has historically sent emails spoofing different types of organizations that send notices, faxes or invoices. First Stage: Distributing Malicious Word Documents 5, 2020, this campaign settled into the infection chain of events shown above.



This blog also contains relatively new indicators noted from this threat actor as of February 2021, and it provides five examples of the associated network ping tool seen in December 2020 and January 2021. This blog reviews examples of recent Hancitor infections within AD environments. To understand how this ping tool is used, we must first understand the chain of events for current Hancitor activity. Normal ping activity is low to nonexistent within a Local Area Network (LAN), but this ping tool generates approximately 1.5 GB of Internet Control Message Protocol (ICMP) traffic as it pings more than 17 million IP addresses of internal, non-routable IPv4 address space. This blog illustrates how the threat actor behind Hancitor uses the network ping tool, so security professionals can better identify and block its use.Īs early as October 2020, Hancitor began utilizing Cobalt Strike and some of these infections utilized a network ping tool to enumerate the infected host’s internal network. In recent months, this actor began using a network ping tool to help enumerate the Active Directory (AD) environment of infected hosts. Approximately three years later, Hancitor remains a threat and has evolved to use tools like Cobalt Strike. In a threat brief from 2018, we noted Hancitor was relatively unsophisticated, but it would remain a threat for years to come. Hancitor is an information stealer and malware downloader used by a threat actor designated as MAN1, Moskalvzapoe or TA511.
