General

  • Target

    DHL (2).jar

  • Size

    248KB

  • Sample

    201015-dby7cdyv4n

  • MD5

    bf7e85ce53f081b7fbf53cbc966d977b

  • SHA1

    45f91fee6ba906415d0435e7ab26d6fc382ab2dd

  • SHA256

    36bf8b0e037807be427a282507832e6fe87bff08c198be3ad333e1032b9d968c

  • SHA512

    22d1bbb716cae019e2b85876fac3ce7de66974cb974c6f9b33655f8db2f64970f2432cbbfea02e1178367a9d50fccd4c96fa539fd1c72e3b0ed59de32e3b4484

Malware Config

Targets

    • Target

      DHL (2).jar

    • Size

      248KB

    • MD5

      bf7e85ce53f081b7fbf53cbc966d977b

    • SHA1

      45f91fee6ba906415d0435e7ab26d6fc382ab2dd

    • SHA256

      36bf8b0e037807be427a282507832e6fe87bff08c198be3ad333e1032b9d968c

    • SHA512

      22d1bbb716cae019e2b85876fac3ce7de66974cb974c6f9b33655f8db2f64970f2432cbbfea02e1178367a9d50fccd4c96fa539fd1c72e3b0ed59de32e3b4484

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks