General

  • Target

    IMG-28102020.jar

  • Size

    72KB

  • Sample

    201028-ps996fnacs

  • MD5

    887b166acc924514a275abbdb1676014

  • SHA1

    b43f7a56b97b635c72628bdde9be1cbc7b5ebd20

  • SHA256

    49331c9f6559832d639324a3ad70ab151d30bd712ff78f8a9cdf3e731f5dcf77

  • SHA512

    8f796e0f3e482afe0d591e4657b640ec715d536c1c71fff9430b9f240490a79bc81cba1521462f23abef76e0a793f7e3e9eca9053fc06b7c8163d54422d61dd3

Malware Config

Targets

    • Target

      IMG-28102020.jar

    • Size

      72KB

    • MD5

      887b166acc924514a275abbdb1676014

    • SHA1

      b43f7a56b97b635c72628bdde9be1cbc7b5ebd20

    • SHA256

      49331c9f6559832d639324a3ad70ab151d30bd712ff78f8a9cdf3e731f5dcf77

    • SHA512

      8f796e0f3e482afe0d591e4657b640ec715d536c1c71fff9430b9f240490a79bc81cba1521462f23abef76e0a793f7e3e9eca9053fc06b7c8163d54422d61dd3

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks