General

  • Target

    Rechnung 1.jar

  • Size

    50KB

  • Sample

    201124-z2bhjr8dtx

  • MD5

    5847b21081ad895a7af96259f5ec0d59

  • SHA1

    a690cb52bbb216fa181d700df67181c90c31d014

  • SHA256

    bd2ef877f531d56a5a2a93d269d19e09195b908b2f39cd8b092f03916ed3b2b1

  • SHA512

    cb844a4b2e976bad6d44c316b9718a2f795b00b91690cfd340ad4e7782eca279f58ff74cc79bc63d9d79e5aa8f232c2fc3e5cdb8b71f8d7a8f125e501d80224f

Malware Config

Targets

    • Target

      Rechnung 1.jar

    • Size

      50KB

    • MD5

      5847b21081ad895a7af96259f5ec0d59

    • SHA1

      a690cb52bbb216fa181d700df67181c90c31d014

    • SHA256

      bd2ef877f531d56a5a2a93d269d19e09195b908b2f39cd8b092f03916ed3b2b1

    • SHA512

      cb844a4b2e976bad6d44c316b9718a2f795b00b91690cfd340ad4e7782eca279f58ff74cc79bc63d9d79e5aa8f232c2fc3e5cdb8b71f8d7a8f125e501d80224f

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks