General

  • Target

    deliverydate.jar

  • Size

    117KB

  • Sample

    201120-dmelj5st86

  • MD5

    65488dc62541ef239ed858e7bce2d52a

  • SHA1

    394257766c5f7ff53f8938efbc73759b82d1206c

  • SHA256

    adae00ba42de16cb01dd5a40b1a9dcdcb72e4b7c01a5b815711a65cfbb9a1e6d

  • SHA512

    32e53b9ab9bc2ae95b7faffb4e19785e259e67026ef5fab65abcdbabad03e2603de016865848ee613e9f9b71ec59b6d6628d4ba62c49724c18ca188131294e0a

Malware Config

Targets

    • Target

      deliverydate.jar

    • Size

      117KB

    • MD5

      65488dc62541ef239ed858e7bce2d52a

    • SHA1

      394257766c5f7ff53f8938efbc73759b82d1206c

    • SHA256

      adae00ba42de16cb01dd5a40b1a9dcdcb72e4b7c01a5b815711a65cfbb9a1e6d

    • SHA512

      32e53b9ab9bc2ae95b7faffb4e19785e259e67026ef5fab65abcdbabad03e2603de016865848ee613e9f9b71ec59b6d6628d4ba62c49724c18ca188131294e0a

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks