General

  • Target

    FedEx #187320605737.jar

  • Size

    106KB

  • Sample

    201107-r4nnbbe5hx

  • MD5

    639fd60d4b49d245a3cfcf1b0efd53d8

  • SHA1

    dbb2cc62b6bafc230cd704bc0ab7bda4553dd2d7

  • SHA256

    e28c627767fe05831e29d27494df463d277978725fa74b4bdf18840861e7781b

  • SHA512

    d6c8973a23a5244032b28825279e108c7cf88ba5a9057fd2379f145cfa4bd91de0d4be96420638a2c138a6b66f2800590d194a2396875a4eb18cca23edbf0c26

Malware Config

Targets

    • Target

      FedEx #187320605737.jar

    • Size

      106KB

    • MD5

      639fd60d4b49d245a3cfcf1b0efd53d8

    • SHA1

      dbb2cc62b6bafc230cd704bc0ab7bda4553dd2d7

    • SHA256

      e28c627767fe05831e29d27494df463d277978725fa74b4bdf18840861e7781b

    • SHA512

      d6c8973a23a5244032b28825279e108c7cf88ba5a9057fd2379f145cfa4bd91de0d4be96420638a2c138a6b66f2800590d194a2396875a4eb18cca23edbf0c26

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks