General

  • Target

    review.delivery.information-f787589c52802370ce0a71033afbf356.jar

  • Size

    82KB

  • Sample

    201112-9b3ww8sckn

  • MD5

    f787589c52802370ce0a71033afbf356

  • SHA1

    0e6ded18abbcc8b36ffbb649b0bc24f9624f86dd

  • SHA256

    0944b4a447e409d6b9af31421bddaa58484b70203c429945570ec533842be635

  • SHA512

    429b9bfd2973283f40998218b0d17b231b915e2a2a58d13fe33402e911541a7f0ee54829305cfbdcdeab7e435ce65999a538f5bb40eaa2f69e56a64bcd6bc936

Malware Config

Targets

    • Target

      review.delivery.information-f787589c52802370ce0a71033afbf356.jar

    • Size

      82KB

    • MD5

      f787589c52802370ce0a71033afbf356

    • SHA1

      0e6ded18abbcc8b36ffbb649b0bc24f9624f86dd

    • SHA256

      0944b4a447e409d6b9af31421bddaa58484b70203c429945570ec533842be635

    • SHA512

      429b9bfd2973283f40998218b0d17b231b915e2a2a58d13fe33402e911541a7f0ee54829305cfbdcdeab7e435ce65999a538f5bb40eaa2f69e56a64bcd6bc936

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks