General

  • Target

    VEM RFQ.jar

  • Size

    59KB

  • Sample

    201109-ajpld93yva

  • MD5

    e2b4ab7ed54f4e7c2f255bb3070af2b2

  • SHA1

    3bfa10831153ac3c856dc1f4a51ba642648a71d4

  • SHA256

    c31445f4089c2a9018e9da605a5e71ddaeb2b70f480e74acbd5a494d1e44ef15

  • SHA512

    bf7420d3cbf93c365ba2255780354c1523e6d68921e93e551440b91989d375e8a70d9e6297539552251165b68d31c17ed4e13b18acd7dbc061121a68eabfc8b6

Malware Config

Targets

    • Target

      VEM RFQ.jar

    • Size

      59KB

    • MD5

      e2b4ab7ed54f4e7c2f255bb3070af2b2

    • SHA1

      3bfa10831153ac3c856dc1f4a51ba642648a71d4

    • SHA256

      c31445f4089c2a9018e9da605a5e71ddaeb2b70f480e74acbd5a494d1e44ef15

    • SHA512

      bf7420d3cbf93c365ba2255780354c1523e6d68921e93e551440b91989d375e8a70d9e6297539552251165b68d31c17ed4e13b18acd7dbc061121a68eabfc8b6

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks