General

  • Target

    FEDEX1090231102994010211000.jar

  • Size

    99KB

  • Sample

    201109-1bwdqlv1h6

  • MD5

    383a770e96f2d241ba6ec8622c6a15b7

  • SHA1

    f1778e6f8c95107fc5f75b74c591feac8e206977

  • SHA256

    344e537d309f34ff04b78446d0dd2092b855181d837920a83c74a58f869a971f

  • SHA512

    5c82f2e83ee6644dc3e7a5d487aef9379a0ea9104737d7529d8aa96de8eca6a3c83abcb417d977cf920c0199eb5659ba017c1c4cfa23b48060781a4835a7ea39

Malware Config

Targets

    • Target

      FEDEX1090231102994010211000.jar

    • Size

      99KB

    • MD5

      383a770e96f2d241ba6ec8622c6a15b7

    • SHA1

      f1778e6f8c95107fc5f75b74c591feac8e206977

    • SHA256

      344e537d309f34ff04b78446d0dd2092b855181d837920a83c74a58f869a971f

    • SHA512

      5c82f2e83ee6644dc3e7a5d487aef9379a0ea9104737d7529d8aa96de8eca6a3c83abcb417d977cf920c0199eb5659ba017c1c4cfa23b48060781a4835a7ea39

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks