General

  • Target

    R.F.Q.jar

  • Size

    95KB

  • Sample

    201117-tx39f9wjvj

  • MD5

    75fe28262beff3cba941aa30438c2efb

  • SHA1

    656b9cfaf5dfee343e476b47950243ce60c5751f

  • SHA256

    8e51f941e056b959365021f58210ed34dbadab3890b95090987db6f87ba6ff58

  • SHA512

    4873383f9aef1086a186681f2a2c6ea23be8f7e0573522fde786c2355068ff62801068977f970186628fbb6be8df6f46a627b67553c646c85c35d82c66dba0a9

Malware Config

Targets

    • Target

      R.F.Q.jar

    • Size

      95KB

    • MD5

      75fe28262beff3cba941aa30438c2efb

    • SHA1

      656b9cfaf5dfee343e476b47950243ce60c5751f

    • SHA256

      8e51f941e056b959365021f58210ed34dbadab3890b95090987db6f87ba6ff58

    • SHA512

      4873383f9aef1086a186681f2a2c6ea23be8f7e0573522fde786c2355068ff62801068977f970186628fbb6be8df6f46a627b67553c646c85c35d82c66dba0a9

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks