General

  • Target

    trackinginfo~update.jar

  • Size

    67KB

  • Sample

    201127-n1c7m4hx8s

  • MD5

    abab4b8aef2f5249a6b84f9acf14085f

  • SHA1

    c1d69dadcc0cb91179d843382e87790641fe94b4

  • SHA256

    495498572e57e6f6260a7875cf56fb24829dbc6489c3930f8131925864b35465

  • SHA512

    adf24caccec50b28b906338abf8f659b77fc76b875f401e46ab1cd5ce8799b72471047c5c0d706c90d8c1eace59ac486c1a83585647efd1f5bbdf8b92e510f20

Malware Config

Targets

    • Target

      trackinginfo~update.jar

    • Size

      67KB

    • MD5

      abab4b8aef2f5249a6b84f9acf14085f

    • SHA1

      c1d69dadcc0cb91179d843382e87790641fe94b4

    • SHA256

      495498572e57e6f6260a7875cf56fb24829dbc6489c3930f8131925864b35465

    • SHA512

      adf24caccec50b28b906338abf8f659b77fc76b875f401e46ab1cd5ce8799b72471047c5c0d706c90d8c1eace59ac486c1a83585647efd1f5bbdf8b92e510f20

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks