General

  • Target

    Facture Octobre #062020.pdf.jar

  • Size

    79KB

  • Sample

    201107-rfxeyga7ws

  • MD5

    4a7c190f6b0127204791b9d0ba7396b3

  • SHA1

    1283c92f8035dd6440b2cebd696177bfac840e02

  • SHA256

    11895cd1cf052ecdc422e34c8fc2a94680c099721239f805588b4a2cc4ece2f3

  • SHA512

    3d0b6ca9f4819ac94f55ab96dccb2bbfba99730fa01a4d3c5398a5f082d63bd6aec3cd29f3c31db0d0356c9ed48ce5f944801126d9613dde07b262b08b59d694

Malware Config

Targets

    • Target

      Facture Octobre #062020.pdf.jar

    • Size

      79KB

    • MD5

      4a7c190f6b0127204791b9d0ba7396b3

    • SHA1

      1283c92f8035dd6440b2cebd696177bfac840e02

    • SHA256

      11895cd1cf052ecdc422e34c8fc2a94680c099721239f805588b4a2cc4ece2f3

    • SHA512

      3d0b6ca9f4819ac94f55ab96dccb2bbfba99730fa01a4d3c5398a5f082d63bd6aec3cd29f3c31db0d0356c9ed48ce5f944801126d9613dde07b262b08b59d694

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks