General

  • Target

    shipment.update.jar

  • Size

    78KB

  • Sample

    201111-rt9zdfp56s

  • MD5

    1d87978aca22f2aea87760aa9740a5bd

  • SHA1

    ca32d5b571f1622cae00343a69989b1970ac5724

  • SHA256

    a0c8dec14afed290247144699853de8c2cc21bbb71e057182f219b771325ec20

  • SHA512

    92197ea9e746b2a0c3ba13190da78fefe42f4eb6016ef5479d88a050b7fe8baf23485ca2d484493224c7b463d964a32657e1fede565910118eb48fee710cdf1c

Malware Config

Targets

    • Target

      shipment.update.jar

    • Size

      78KB

    • MD5

      1d87978aca22f2aea87760aa9740a5bd

    • SHA1

      ca32d5b571f1622cae00343a69989b1970ac5724

    • SHA256

      a0c8dec14afed290247144699853de8c2cc21bbb71e057182f219b771325ec20

    • SHA512

      92197ea9e746b2a0c3ba13190da78fefe42f4eb6016ef5479d88a050b7fe8baf23485ca2d484493224c7b463d964a32657e1fede565910118eb48fee710cdf1c

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks