General

  • Target

    AWB051120.jar

  • Size

    109KB

  • Sample

    201106-mzgp1g5t36

  • MD5

    f17ee8a3e364faa7296e453ad60cd1d4

  • SHA1

    863fe6242f284f1dcc7ecbb2faccd296895d5cdf

  • SHA256

    43b00ce8ab382b247ec70fe0ea52becff208637b49c56a54c35c89043aed0ada

  • SHA512

    15b2776081bd224ab63d636edf0096b1aa7eaf5b633e8c7a9710d4c7086f144dbc9d49235503f72fa62530a23ae0f49c477f0976457a301b1756294793c6711c

Malware Config

Targets

    • Target

      AWB051120.jar

    • Size

      109KB

    • MD5

      f17ee8a3e364faa7296e453ad60cd1d4

    • SHA1

      863fe6242f284f1dcc7ecbb2faccd296895d5cdf

    • SHA256

      43b00ce8ab382b247ec70fe0ea52becff208637b49c56a54c35c89043aed0ada

    • SHA512

      15b2776081bd224ab63d636edf0096b1aa7eaf5b633e8c7a9710d4c7086f144dbc9d49235503f72fa62530a23ae0f49c477f0976457a301b1756294793c6711c

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks