General

  • Target

    Invoice.jar

  • Size

    120KB

  • Sample

    201105-25mbygcyvn

  • MD5

    391eab24cb9b95597be7a1b690b024e9

  • SHA1

    c302d181956e35c1ab8ccbf6da575673725c920a

  • SHA256

    032ceead01998c59d55d9fa60642e9708e5e1073e10c86f1abb2c3f5443a3c03

  • SHA512

    0170562462b01bc48429ffe53035b5b1e5e59c2492cf79cc150b517ae9426e8cf41c2bfa7fc92a2664194bba77cfda0957de53ac98cf06d3720ec49217e59b94

Malware Config

Targets

    • Target

      Invoice.jar

    • Size

      120KB

    • MD5

      391eab24cb9b95597be7a1b690b024e9

    • SHA1

      c302d181956e35c1ab8ccbf6da575673725c920a

    • SHA256

      032ceead01998c59d55d9fa60642e9708e5e1073e10c86f1abb2c3f5443a3c03

    • SHA512

      0170562462b01bc48429ffe53035b5b1e5e59c2492cf79cc150b517ae9426e8cf41c2bfa7fc92a2664194bba77cfda0957de53ac98cf06d3720ec49217e59b94

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks