General

  • Target

    Order02102020.jar

  • Size

    231KB

  • Sample

    201005-8ffkpb3gss

  • MD5

    14df30e43c2fa8e9202e74fea649d5f0

  • SHA1

    80f7ff0c36220e6fc1f9c2ca196ed898321386e6

  • SHA256

    bd081460ce6b479da9e8bcace4e71315d493ea23791f9eda446cc54c2f8459d2

  • SHA512

    f59ca009f58b66941a0dff62d783d08e9b3228f7ce86e978bf4b908b67bc36e91f5eee510a9634e5f646db7fe466d7cceb911b11910a430e10cb88f41fc515e0

Malware Config

Targets

    • Target

      Order02102020.jar

    • Size

      231KB

    • MD5

      14df30e43c2fa8e9202e74fea649d5f0

    • SHA1

      80f7ff0c36220e6fc1f9c2ca196ed898321386e6

    • SHA256

      bd081460ce6b479da9e8bcace4e71315d493ea23791f9eda446cc54c2f8459d2

    • SHA512

      f59ca009f58b66941a0dff62d783d08e9b3228f7ce86e978bf4b908b67bc36e91f5eee510a9634e5f646db7fe466d7cceb911b11910a430e10cb88f41fc515e0

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks