What We Do
How We Do
Resources
Company
Partners
Get Started
Security advisories

HelloFax Hancitor Campaign

February 26, 2019 | 2 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

The eSentire Threat Intelligence team is tracking a recently identified campaign delivering Hancitor malware through malicious “HelloFax” emails. This campaign leverages trusted cloud services for delivering malicious Microsoft Word documents to victims. If executed successfully, Hancitor results in the installation of additional malware such as banking trojans.

What we’re doing about it

What you should do about it

Additional information

HelloFax is an online fax service that allows users to send PDF documents as faxes or receive faxes as PDF documents via email.

Hancitor is a downloader that has been known to download and install a variety of other malware including banking trojans and ransomware. Although originally identified in 2014, Hancitor has remained popular amongst threat actors, and is actively maintained and modified.

Beginning on April 19, 2018, eSentire’s Security Operation Centre responded to multiple incidents associated with this threat. Observed emails include a link to one of several compromised domains hosting malicious Word documents on Google Drive. End users that download the file and enable macros will unwittingly be infected by the Hancitor downloader (see figure 1 for example). This is an active campaign; the attacker may institute additional compromised domains to carry out attacks.

Indicators

Sender Addresses:

Subject Lines:

Links to Malware Document (all resolve to 35.204.196.178* as of 2018-04-20):

Malware Document:

Command and Control Infrastructure:

Malware Analysis Notes

When the document macro is executed, it will inject malicious code into a svchost.exe process. The svchost.exe process will then reach out to the Hancitor Command and Control infrastructure to download a secondary payload. Recently observed secondary payloads for Hancitor have included the Pony Trojan and the Zeus Panda Banking Trojan.

[image src="/assets/9edbde9e29/HelloFax-Hancitor-Campaign-figure-1.jpg" id="1226" width="589" height="419" class="center ss-htmleditorfield-file image" title="HelloFax Hancitor Campaign figure 1"]

*eSentire is actively blocking observed Hancitor Command and Control infrastructure.

As the malicious Word documents are hosted using a trusted cloud service (IP 35.204.196.178 and Google Drive), it is not feasible to block these addresses at this time.

View Most Recent Advisories