General

  • Target

    Facture Octobre #052020.pdf.jar

  • Size

    120KB

  • Sample

    201106-mqnw153sk6

  • MD5

    c7139ea7b8db4abd3c0928fc15dc523e

  • SHA1

    91c8278bc94c53fcec38777367b70ba670fb582d

  • SHA256

    51817fd0b405ba6f554cb54c80e0c8c3add58876f6a2354dcb8146c538959cd5

  • SHA512

    567b0e55a93a78262608e6a914fb89b6eb500f30327db776507fd5ceed7dace6536154e0f678f3ad3da8a35a3db58c05183caf6b395ee03034761882ffada776

Malware Config

Targets

    • Target

      Facture Octobre #052020.pdf.jar

    • Size

      120KB

    • MD5

      c7139ea7b8db4abd3c0928fc15dc523e

    • SHA1

      91c8278bc94c53fcec38777367b70ba670fb582d

    • SHA256

      51817fd0b405ba6f554cb54c80e0c8c3add58876f6a2354dcb8146c538959cd5

    • SHA512

      567b0e55a93a78262608e6a914fb89b6eb500f30327db776507fd5ceed7dace6536154e0f678f3ad3da8a35a3db58c05183caf6b395ee03034761882ffada776

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks