General

  • Target

    DHL PAKET(2).jar

  • Size

    103KB

  • Sample

    201109-ra1aw6nyca

  • MD5

    e299449157cf031f03fbfe79d7900d52

  • SHA1

    d57ca0f5a6770b760f40e2be3948869ff14caa08

  • SHA256

    fcca91752e1952ea82e9528213dcd6e063277b0df1becad05cd5071509ef6074

  • SHA512

    e4f61b06a8b6f605478b612851ead655f984866919973a6740e417e055c20c309a81786eb3d8c99816a49abe07c009e2efa8bfd672c5e7516dfc8a8fbe23a6ba

Malware Config

Targets

    • Target

      DHL PAKET(2).jar

    • Size

      103KB

    • MD5

      e299449157cf031f03fbfe79d7900d52

    • SHA1

      d57ca0f5a6770b760f40e2be3948869ff14caa08

    • SHA256

      fcca91752e1952ea82e9528213dcd6e063277b0df1becad05cd5071509ef6074

    • SHA512

      e4f61b06a8b6f605478b612851ead655f984866919973a6740e417e055c20c309a81786eb3d8c99816a49abe07c009e2efa8bfd672c5e7516dfc8a8fbe23a6ba

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks