General

  • Target

    Scanned from a Xerox Multifunction Printer.jar

  • Size

    71KB

  • Sample

    201027-5r5dtp8rme

  • MD5

    ef50330c3ba37193196fb2678b81c358

  • SHA1

    fedda1f30f37cfbcd7a30fadfb32da968923bc55

  • SHA256

    51a266885dd543b93c91be648fd52e64fae3a3af8a17616e86357facb982622f

  • SHA512

    ea5a1a3b90f3663dea5408d49b6e453872fd6446d688ac409d9c750478c17b1b8ab2e47ea95e2f1860f9af4cf5b83fbbf806671781c09d6b2e08ef880f23b024

Malware Config

Targets

    • Target

      Scanned from a Xerox Multifunction Printer.jar

    • Size

      71KB

    • MD5

      ef50330c3ba37193196fb2678b81c358

    • SHA1

      fedda1f30f37cfbcd7a30fadfb32da968923bc55

    • SHA256

      51a266885dd543b93c91be648fd52e64fae3a3af8a17616e86357facb982622f

    • SHA512

      ea5a1a3b90f3663dea5408d49b6e453872fd6446d688ac409d9c750478c17b1b8ab2e47ea95e2f1860f9af4cf5b83fbbf806671781c09d6b2e08ef880f23b024

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks