{"id":6431,"date":"2021-06-22T15:05:23","date_gmt":"2021-06-22T22:05:23","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6431"},"modified":"2024-04-26T13:20:37","modified_gmt":"2024-04-26T20:20:37","slug":"hancitor-downloads-infostealers","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/","title":{"rendered":"Hancitor Downloads Infostealers"},"content":{"rendered":"<h3><strong>Author: James Barnett<\/strong><\/h3>\n<h3><strong>TLP: WHITE<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>Overview<\/h3>\n<p>From June 9 to 17, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.<sup>1<\/sup><sup>,<\/sup><sup>2<\/sup><sup>,<\/sup><sup>3<\/sup><sup>,<\/sup><sup>4<\/sup><strong>\u00a0<\/strong><\/p>\n<h3>Customer Impact<\/h3>\n<p>Hancitor targets businesses and individuals around the world. Threat actors distribute it via malspam sent by compromised servers in the United States, Japan, Canada and many other countries. These malicious emails mimic notifications from legitimate organizations to entice the targets to download weaponized Microsoft Office documents.<\/p>\n<p>We have written about previous Hancitor campaigns in April 2020<sup>5<\/sup> and December 2020.<sup>6<\/sup> Many of Hancitor\u2019s core characteristics have remained the same, but these recent campaigns use a new method of obfuscating malicious URLs in their malspam messages.<\/p>\n<h3>Campaign Analysis<\/h3>\n<p>The emails in these campaigns use a DocuSign-themed lure to entice a target into opening a link in the message. The subject lines of the emails indicate that the target has a pending invoice or notification from DocuSign. Each email contains an embedded link that uses Google\u2019s Feed Proxy service to redirect the target to a compromised website that hosts a malicious Microsoft Word document.<\/p>\n<h3>Attack Chain<\/h3>\n<p>Upon clicking the link in the initial Hancitor malspam email, the victim is redirected to one of several websites that try to download a malicious Word file. When the victim opens this file, it displays a message instructing the victim to enable content. Doing so executes the malicious macros in the document. The macros then extract and execute the Hancitor payload\u2019s dynamic link library (DLL) embedded within the Word document, thus establishing the initial Hancitor infection.<\/p>\n<p>Once Hancitor infects the victim\u2019s system, it sends basic information about the system to one of its hardcoded command and control (C&#038;C) servers. The server responds with further instructions, which direct Hancitor to download and execute one or more additional malware payloads. <\/p>\n<p>In these campaigns, Hancitor delivered one of two possible additional payloads.The first payload was Cobalt Strike: a legitimate penetration testing tool that has been gaining popularity among threat actors. Its features include infostealer capabilities, such as keylogging; exploits that can leverage system vulnerabilities to facilitate additional attacks; and various methods that help conceal the infostealer\u2019s activity on both the infected system and the victim\u2019s network.<sup>7<\/sup><\/p>\n<p>The second payload was Ficker Stealer: a relatively new Malware-as-a-Service (MaaS) infostealer, identified in August 2020.<sup>8<\/sup> According to the author of Ficker Stealer, the malware is capable of stealing web browser passwords, cryptocurrency wallets, FTP client information, credentials stored by Windows Credential Manager, and session information from various chat and email clients.<sup>9<\/sup><\/p>\n<h3>Vulnerabilities &#038; Mitigation<\/h3>\n<p>Hancitor uses several advanced detection countermeasures to bypass antivirus software and firewall-based security. The best way for users to protect themselves from Hancitor is to be wary of links in incoming emails. Namely, a user should:<\/p>\n<ul>\n<li>Ensure that links in an email point to the domain of the company where the email appears to have originated. For example, if the sender is FedEx, that domain would be http:\/\/fedex[.]com.<\/li>\n<li>Be suspicious of a link that, when clicked, immediately attempts to download a file.<\/li>\n<li>Avoid enabling macros in a Microsoft Office attachment, especially if the file\u2019s only apparent content is a message with instructions to enable the macros.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/threat-intelligence-125.jpg\" alt=\"\" width=\"528\" height=\"838\" class=\"aligncenter size-full wp-image-6536\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-125.jpg 528w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threat-intelligence-125-189x300.jpg 189w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" \/><\/p>\n<h3><strong>Endnotes<\/strong><\/h3>\n<ol>\n<li><a href=\"https:\/\/pastebin.com\/FKkX5djU\">https:\/\/pastebin.com\/FKkX5djU<\/a><\/li>\n<li><a href=\"https:\/\/pastebin.com\/4BgfXiw8\">https:\/\/pastebin.com\/4BgfXiw8<\/a><\/li>\n<li><a href=\"https:\/\/www.malware-traffic-analysis.net\/2021\/06\/17\/index.html\">https:\/\/www.malware-traffic-analysis.net\/2021\/06\/17\/index.html<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/James_inthe_box\/status\/1402638692666142727\">https:\/\/twitter.com\/James_inthe_box\/status\/1402638692666142727<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--69\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;69<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--96\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;96<\/a><\/li>\n<li><a href=\"https:\/\/www.cobaltstrike.com\/features\">https:\/\/www.cobaltstrike.com\/features<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/Cyber_Bolo\/status\/1294576137495023616\">https:\/\/twitter.com\/Cyber_Bolo\/status\/1294576137495023616<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/3xp0rtblog\/status\/1321209656774135810\">https:\/\/twitter.com\/3xp0rtblog\/status\/1321209656774135810<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: James Barnett TLP: WHITE &nbsp; Overview From June 9 to 17, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6714,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[377,376,517,294],"class_list":{"0":"post-6431","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-docusign","9":"tag-hancitor","10":"tag-infostealers","11":"tag-malspam","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hancitor Downloads Infostealers<\/title>\n<meta name=\"description\" content=\"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hancitor Downloads Infostealers\" \/>\n<meta property=\"og:description\" content=\"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-22T22:05:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Hancitor Downloads Infostealers\",\"datePublished\":\"2021-06-22T22:05:23+00:00\",\"dateModified\":\"2024-04-26T20:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/\"},\"wordCount\":617,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-04.jpg\",\"keywords\":[\"docusign\",\"Hancitor\",\"Infostealers\",\"Malspam\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/\",\"name\":\"Hancitor Downloads Infostealers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-04.jpg\",\"datePublished\":\"2021-06-22T22:05:23+00:00\",\"dateModified\":\"2024-04-26T20:20:37+00:00\",\"description\":\"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-04.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-04.jpg\",\"width\":612,\"height\":408,\"caption\":\"Hacked alert on the screen of smartphone on laptop computer. Skull of death on data flowing background. Selective focus on screen of the phone.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/hancitor-downloads-infostealers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hancitor Downloads Infostealers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hancitor Downloads Infostealers","description":"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/","og_locale":"en_US","og_type":"article","og_title":"Hancitor Downloads Infostealers","og_description":"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/","og_site_name":"Infoblox Blog","article_published_time":"2021-06-22T22:05:23+00:00","article_modified_time":"2024-04-26T20:20:37+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Hancitor Downloads Infostealers","datePublished":"2021-06-22T22:05:23+00:00","dateModified":"2024-04-26T20:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/"},"wordCount":617,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg","keywords":["docusign","Hancitor","Infostealers","Malspam"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/","name":"Hancitor Downloads Infostealers","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg","datePublished":"2021-06-22T22:05:23+00:00","dateModified":"2024-04-26T20:20:37+00:00","description":"Hancitor Downloads Infostealers. From 9 to 17 June, Infoblox observed multiple malspam campaigns that used DocuSign-themed lures. The malspam enticed users to download and open Microsoft Word documents with malicious macros that installed embedded copies of the trojan downloader Hancitor. The existence of these campaigns was independently corroborated by multiple external sources.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-04.jpg","width":612,"height":408,"caption":"Hacked alert on the screen of smartphone on laptop computer. Skull of death on data flowing background. Selective focus on screen of the phone."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/hancitor-downloads-infostealers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"Hancitor Downloads Infostealers"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6431"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6431\/revisions"}],"predecessor-version":[{"id":6538,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6431\/revisions\/6538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6714"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}