General

  • Target

    INVOICE 000.jar

  • Size

    196KB

  • Sample

    201013-bbm61gxc82

  • MD5

    0829f6bcb6b2d0857e551008522d9db8

  • SHA1

    c6f12d5cbfd8222b551a844cb364a369c0faf744

  • SHA256

    6277e9e9e13f3ca2cc2f66feaf957a052bdc851e40aa5bdd9c934ef452ee0546

  • SHA512

    169e605f7968b2561a6180d103e476be7b185047ba971f20f74e8cbfcdd2674bccf8962ba9e8b30e76fe996bf2da4e276179e842250c727142875cd0510715a2

Malware Config

Targets

    • Target

      INVOICE 000.jar

    • Size

      196KB

    • MD5

      0829f6bcb6b2d0857e551008522d9db8

    • SHA1

      c6f12d5cbfd8222b551a844cb364a369c0faf744

    • SHA256

      6277e9e9e13f3ca2cc2f66feaf957a052bdc851e40aa5bdd9c934ef452ee0546

    • SHA512

      169e605f7968b2561a6180d103e476be7b185047ba971f20f74e8cbfcdd2674bccf8962ba9e8b30e76fe996bf2da4e276179e842250c727142875cd0510715a2

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks