During this 3rd quarter of 2017, several malspam campaigns have been successfully distributing the Hancitor Downloader.  The dropper uses strategies and obfuscation techniques on infected PCs, and has been observed delivering a variety of payloads.  

 

The early August "Shipment Arrived" malspam campaign masquerades as a FedEx shipment delivery notice and attempts to trick victims into clicking a link to download the invoice document which contains malicious macros.  This variant uses native API calls within Visual Basic code to carve out and decrypt embedded malware from malicious Word documents. In this case the payload is Zbot.

 

email.PNG

Once clicked on link, following word document gets downloaded. 

 

maldoc.PNG

 

VirusTotal Analysis of Fedex_Invoice_598791.doc : 

 

maldocVT.PNG

Submitting the delivery document to What's This File service shows more information about the malicious word document.

 

2017-08-16-141243_1824x984_scrot.png

2017-08-16-141604_1824x984_scrot.png

This activity is captured in the process tree below, which downloads and executes the payload:

process.PNG

get.PNG

 

VirusTotal Analysis of the dropped file confirms that it’s Zbot Malware delivered by Hancitor: 

 

droppedVT.PNG

More information about Zbot variants detection and RSA FirstWatch feed :

 

 Current RSA NetWitness detection populates following meta:

  

nw1.PNG

nw2.PNG

 

Thanks go to Ahmed Sonbol and Kevin Stear for contributing to this threat advisory.

  

FirstWatch_banner.png

 

Reference:

Topic: