General

  • Target

    00298844-3891378.jar

  • Size

    89KB

  • Sample

    201109-pwlq1t8k1x

  • MD5

    5fea82b7430fa7c07350b778e18819c8

  • SHA1

    58d29d23a5b7e4ed59635058f094d9993a8f136d

  • SHA256

    1ee316f2b323c193684a2e41a6039448c65620cdee69f2203bf107d4ad990529

  • SHA512

    14bdda93526123c840d855318d5fa73cd8b3ae0040a7e325f97045a69010daf9001cadf6d26b5df26836acbc4ecedfbcfa3bc34d934d5fdf5047e02982e67790

Malware Config

Targets

    • Target

      00298844-3891378.jar

    • Size

      89KB

    • MD5

      5fea82b7430fa7c07350b778e18819c8

    • SHA1

      58d29d23a5b7e4ed59635058f094d9993a8f136d

    • SHA256

      1ee316f2b323c193684a2e41a6039448c65620cdee69f2203bf107d4ad990529

    • SHA512

      14bdda93526123c840d855318d5fa73cd8b3ae0040a7e325f97045a69010daf9001cadf6d26b5df26836acbc4ecedfbcfa3bc34d934d5fdf5047e02982e67790

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks