General

  • Target

    Shipment_774994746621.jar

  • Size

    79KB

  • Sample

    201105-rdjdvc3sf6

  • MD5

    ea5c41d0235e11dacea16eda175971de

  • SHA1

    a7a958b3ae234cd68b3dcf08bd08740f3c19d11f

  • SHA256

    0e2556356638079a13e6443f62c06be6e509d4c59433a06c5f76191e21f6bb5e

  • SHA512

    a14e158ded6f12fcd6b66ebf761e802d54a5d52638e02e8529868a1b0efcfc9867be4180ed5b29c490ea2d14b43a8ac984ce69a75f82e8c4cb5f9de823235102

Malware Config

Targets

    • Target

      Shipment_774994746621.jar

    • Size

      79KB

    • MD5

      ea5c41d0235e11dacea16eda175971de

    • SHA1

      a7a958b3ae234cd68b3dcf08bd08740f3c19d11f

    • SHA256

      0e2556356638079a13e6443f62c06be6e509d4c59433a06c5f76191e21f6bb5e

    • SHA512

      a14e158ded6f12fcd6b66ebf761e802d54a5d52638e02e8529868a1b0efcfc9867be4180ed5b29c490ea2d14b43a8ac984ce69a75f82e8c4cb5f9de823235102

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks