General

  • Target

    DHL_Nov 2020 at 1.85_8BZ290_PDF.jar

  • Size

    71KB

  • Sample

    201127-etklnp6jga

  • MD5

    f204d9f0175eb6a66a0e312d63477680

  • SHA1

    e161a465e339be0ec43ba30ee7b0c25a9b40dc0e

  • SHA256

    d529003a6e1708637cc07277bfbef218db0dcaec7eed84b28567910f439297ee

  • SHA512

    7d0c8c20539affd05bc5ee7de1cdc4cb65e2127b7972418c686677d7b4d12e34803446f73bce0406fdeeea6ab72c9fabee5aeb81985bce1502aabaa9d531c227

Malware Config

Targets

    • Target

      DHL_Nov 2020 at 1.85_8BZ290_PDF.jar

    • Size

      71KB

    • MD5

      f204d9f0175eb6a66a0e312d63477680

    • SHA1

      e161a465e339be0ec43ba30ee7b0c25a9b40dc0e

    • SHA256

      d529003a6e1708637cc07277bfbef218db0dcaec7eed84b28567910f439297ee

    • SHA512

      7d0c8c20539affd05bc5ee7de1cdc4cb65e2127b7972418c686677d7b4d12e34803446f73bce0406fdeeea6ab72c9fabee5aeb81985bce1502aabaa9d531c227

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks