General

  • Target

    Mailbox-Terms&Conditions.jar

  • Size

    105KB

  • Sample

    201118-gldzd35lda

  • MD5

    2cd2a9c538d60272d886da96d64c48e8

  • SHA1

    5938a8d9d5844a484b3f9a50debdcbb8dd8bc4ee

  • SHA256

    0b8de3d6c9436e30b7fec75b652ecc25d8b3d4162ad99c8496ff8aad8b019f76

  • SHA512

    426fe852835660851726f3309346483959dca24ff77e0f742c39ecde7e3559e28465893917311ed087f019196083e46043bf6d7e190d713c16a14bfdb6e946cf

Malware Config

Targets

    • Target

      Mailbox-Terms&Conditions.jar

    • Size

      105KB

    • MD5

      2cd2a9c538d60272d886da96d64c48e8

    • SHA1

      5938a8d9d5844a484b3f9a50debdcbb8dd8bc4ee

    • SHA256

      0b8de3d6c9436e30b7fec75b652ecc25d8b3d4162ad99c8496ff8aad8b019f76

    • SHA512

      426fe852835660851726f3309346483959dca24ff77e0f742c39ecde7e3559e28465893917311ed087f019196083e46043bf6d7e190d713c16a14bfdb6e946cf

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks