General

  • Target

    AWB20201012.jar

  • Size

    183KB

  • Sample

    201013-yx58axbpd2

  • MD5

    aa3320b8e3e59a930e952619b4f0b0ed

  • SHA1

    100a79f58f7402410d87c399c85765d0d26e365a

  • SHA256

    846a118d19c8f3d72b77fd81af21a17f0b006f1a86eae66b6ef9b43f4be70e12

  • SHA512

    1c9091e9c30f9698057858a2309822b41b8cd153b0c14cf9981a1ab0b104c71cafe7743670e781c8e9f8bd20bf5f577d200b94e6785620688f9c4129495e57c2

Malware Config

Targets

    • Target

      AWB20201012.jar

    • Size

      183KB

    • MD5

      aa3320b8e3e59a930e952619b4f0b0ed

    • SHA1

      100a79f58f7402410d87c399c85765d0d26e365a

    • SHA256

      846a118d19c8f3d72b77fd81af21a17f0b006f1a86eae66b6ef9b43f4be70e12

    • SHA512

      1c9091e9c30f9698057858a2309822b41b8cd153b0c14cf9981a1ab0b104c71cafe7743670e781c8e9f8bd20bf5f577d200b94e6785620688f9c4129495e57c2

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks