General

  • Target

    FedEx #187320605737.jar

  • Size

    75KB

  • Sample

    201109-1an94werpx

  • MD5

    556d3bbd059f20eecb26acf1ba4e2618

  • SHA1

    7af2267b6e71d70e9f432e017dd939d7508aec49

  • SHA256

    a635ab4ec8492d9c26771aa2e50722f14e6f87083aa6dd89dfe64ebc5412f217

  • SHA512

    1e87685223a7054ab52727135ef45abc74e573eebd63db14834553f926d4bba42e8c89bf1d388ec2990054b0848341290509e29f8d8bad6435a9b0b42439ec48

Malware Config

Targets

    • Target

      FedEx #187320605737.jar

    • Size

      75KB

    • MD5

      556d3bbd059f20eecb26acf1ba4e2618

    • SHA1

      7af2267b6e71d70e9f432e017dd939d7508aec49

    • SHA256

      a635ab4ec8492d9c26771aa2e50722f14e6f87083aa6dd89dfe64ebc5412f217

    • SHA512

      1e87685223a7054ab52727135ef45abc74e573eebd63db14834553f926d4bba42e8c89bf1d388ec2990054b0848341290509e29f8d8bad6435a9b0b42439ec48

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks