General

  • Target

    4b62b502ab63d3c23386068954fa7c73.jar

  • Size

    54KB

  • Sample

    201125-haptlrp5hx

  • MD5

    4b62b502ab63d3c23386068954fa7c73

  • SHA1

    079c3c46af6b94fb838e3382bf0a0628eb636d3b

  • SHA256

    61f755a1b4b17c26aa0a66d6dc16bb346bd2e58b874a0264aa7c135b86444828

  • SHA512

    10841dca540e8ef0e8e675e6f58ff7c87cfe1caf820a1083e52bfa826823e9ba1282f28735fffee6158319469b9646919166c3fa31e85f52f458b17ebd66150e

Malware Config

Targets

    • Target

      4b62b502ab63d3c23386068954fa7c73.jar

    • Size

      54KB

    • MD5

      4b62b502ab63d3c23386068954fa7c73

    • SHA1

      079c3c46af6b94fb838e3382bf0a0628eb636d3b

    • SHA256

      61f755a1b4b17c26aa0a66d6dc16bb346bd2e58b874a0264aa7c135b86444828

    • SHA512

      10841dca540e8ef0e8e675e6f58ff7c87cfe1caf820a1083e52bfa826823e9ba1282f28735fffee6158319469b9646919166c3fa31e85f52f458b17ebd66150e

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks