General

  • Target

    fin_bsc_report.jar

  • Size

    73KB

  • Sample

    201019-nec5t7r36n

  • MD5

    7447f61327acef94cbdaaaacdc5f7f2d

  • SHA1

    d831ded9fc308cc53be80d819d33128392fcf962

  • SHA256

    47f862b9d75a9190696a0620efddfe7e43b16b79c0b0f009a55ed5360f35b312

  • SHA512

    0f4264a0335589b23e1c1a65f6bcbec24d5c4266e5d5d851fa2ad6990300618c7fa4e44ec957e095a9629c6d95175883636d7e7188297387ca21c25372cf8146

Malware Config

Targets

    • Target

      fin_bsc_report.jar

    • Size

      73KB

    • MD5

      7447f61327acef94cbdaaaacdc5f7f2d

    • SHA1

      d831ded9fc308cc53be80d819d33128392fcf962

    • SHA256

      47f862b9d75a9190696a0620efddfe7e43b16b79c0b0f009a55ed5360f35b312

    • SHA512

      0f4264a0335589b23e1c1a65f6bcbec24d5c4266e5d5d851fa2ad6990300618c7fa4e44ec957e095a9629c6d95175883636d7e7188297387ca21c25372cf8146

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks