General

  • Target

    DHL PAKET(1).jar

  • Size

    78KB

  • Sample

    201105-x88622ghsj

  • MD5

    58f7e6ce14c9de20d69d827cb46a01c3

  • SHA1

    5add0ecce78774811645614bb66272a274013727

  • SHA256

    6d7391f3b72f90dc29c7ec23669cfd7d446bca076785a54dc62ffefb5afe9177

  • SHA512

    c8ba502abf70b324a2ecc5f9cbf92c28c71bcbc796e8d635d9a4671d11ef8630a53a745854c74308f9c4592af70b72a0e3575d928051a0d61c03a55277f3ddb1

Malware Config

Targets

    • Target

      DHL PAKET(1).jar

    • Size

      78KB

    • MD5

      58f7e6ce14c9de20d69d827cb46a01c3

    • SHA1

      5add0ecce78774811645614bb66272a274013727

    • SHA256

      6d7391f3b72f90dc29c7ec23669cfd7d446bca076785a54dc62ffefb5afe9177

    • SHA512

      c8ba502abf70b324a2ecc5f9cbf92c28c71bcbc796e8d635d9a4671d11ef8630a53a745854c74308f9c4592af70b72a0e3575d928051a0d61c03a55277f3ddb1

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks