General

  • Target

    shipmentupdate~infromation.jar

  • Size

    72KB

  • Sample

    201111-v6qh6argpj

  • MD5

    9b1a66b4b6c9852d9849f4181c520f1f

  • SHA1

    7ab5dd37c8c02992c24f2a3ab911bd0798b29df6

  • SHA256

    7266877e50b850d7e9ef7f151a1596df36d116ac6d0d9ad6bfb4641348430c36

  • SHA512

    675c198a8dbff25d9410f468edf0197e438a0ca10987e5edbff46c9cdf6dd3379a5855b20f7d426b8496342245d3c8b5a9fbe37ca42d062648f3580424b55011

Malware Config

Targets

    • Target

      shipmentupdate~infromation.jar

    • Size

      72KB

    • MD5

      9b1a66b4b6c9852d9849f4181c520f1f

    • SHA1

      7ab5dd37c8c02992c24f2a3ab911bd0798b29df6

    • SHA256

      7266877e50b850d7e9ef7f151a1596df36d116ac6d0d9ad6bfb4641348430c36

    • SHA512

      675c198a8dbff25d9410f468edf0197e438a0ca10987e5edbff46c9cdf6dd3379a5855b20f7d426b8496342245d3c8b5a9fbe37ca42d062648f3580424b55011

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks