General

  • Target

    FedEx #187320605737.jar

  • Size

    77KB

  • Sample

    201105-46vdej3c7j

  • MD5

    03cea94c4982504374bf20e9dbb4c205

  • SHA1

    9a1bff66db5093102a35c3b49c992fd363eb5cdd

  • SHA256

    898d0a65e30c75af41dd79e1ae7420b2151255b0261e30931c646c96a025c4fd

  • SHA512

    1262022346d67fefc4567eae38b8f33320259f5d4af4e4f0ff3eb924d1bd005cc0b40e5d0f05e1a9b0ab4d751a965d0b9ef4fc20700a201cc08961de5e37a78c

Malware Config

Targets

    • Target

      FedEx #187320605737.jar

    • Size

      77KB

    • MD5

      03cea94c4982504374bf20e9dbb4c205

    • SHA1

      9a1bff66db5093102a35c3b49c992fd363eb5cdd

    • SHA256

      898d0a65e30c75af41dd79e1ae7420b2151255b0261e30931c646c96a025c4fd

    • SHA512

      1262022346d67fefc4567eae38b8f33320259f5d4af4e4f0ff3eb924d1bd005cc0b40e5d0f05e1a9b0ab4d751a965d0b9ef4fc20700a201cc08961de5e37a78c

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks