Hancitor is a popular downloader that delivers a wide variety of other malware since first being seen in 2014.
The following platforms are known to be affected:
|12 May 2021||
Hancitor being used in Cuba ransomware campaigns
Hancitor has been used in recent Cuba ransomware campaigns. It is delivered via spam emails containing a link purporting to sign a document from a popular document signing service. When a user interacts with the link, a macro-laden Word document containing a Hancitor payload is downloaded and opened. This document will extract and execute Hancitor if the user enables the macros, dropping it as a Dynamic Link Library to C:\Users\%username%\AppData\Roaming\Microsoft\Word and running it via rundll32.exe.
Hancitor then downloads tools to facilitate lateral movement and data extraction prior to the deployment of Cuba ransomware. These tools commonly include Flicker stealer and, if an Active Directory (AD) environment is detected, Cobalt Strike. A network ping tool to enumerate the AD environment has also been downloaded in these campaigns.
To prevent and detect an infection, NHS Digital advises that:
- Secure configurations are applied to all devices.
- Security updates are applied at the earliest opportunity.
- Tamper protection settings in security products are enabled where available.
- Obsolete platforms are segregated from the rest of the network.
- IT usage policies are reinforced by regular training to ensure all users know not to open unsolicited links or attachments.
- Multi-factor authentication (MFA) and lockout policies are used where practicable, especially for administrative accounts.
- Administrative accounts are only used for necessary purposes.
- Remote administration services use strongly encrypted protocols and only accept connections from authorised users or locations.
- Systems are continuously monitored, and unusual activity is investigated, so that a compromise of the network can be detected as early as possible.
Please note that the NCSC maintains guidance for securely configuring a wide range of end user device (EUD) platforms. For further details refer to their end user device security guidance pages.
Indicators of compromise
Last edited: 12 May 2021 3:27 pm