General

  • Target

    pakets1.jar

  • Size

    89KB

  • Sample

    201109-3kw4l3lvt6

  • MD5

    d562ac2509dbeff1f3759548f5f7137a

  • SHA1

    db4963f847bec83553d7c4e230854386319a2f25

  • SHA256

    4d99df44f8b2928c9faf68d49c2fe083c721dccba6c9fdbb5bd9e769aef0862a

  • SHA512

    37a7b44c2130753ece99b0f5ae79cf3ea42210dc712589426743873da89e2cbcfe99b8c158444ad2f3d658c141f2d841c8ec11c8abadb6b06ac1ea4df9aac5a9

Malware Config

Targets

    • Target

      pakets1.jar

    • Size

      89KB

    • MD5

      d562ac2509dbeff1f3759548f5f7137a

    • SHA1

      db4963f847bec83553d7c4e230854386319a2f25

    • SHA256

      4d99df44f8b2928c9faf68d49c2fe083c721dccba6c9fdbb5bd9e769aef0862a

    • SHA512

      37a7b44c2130753ece99b0f5ae79cf3ea42210dc712589426743873da89e2cbcfe99b8c158444ad2f3d658c141f2d841c8ec11c8abadb6b06ac1ea4df9aac5a9

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks