General

  • Target

    f4.jar

  • Size

    57KB

  • Sample

    201208-frbcdhhcdn

  • MD5

    ae77d6c4c46bbfdaa23c9238d12dcd98

  • SHA1

    4a5e4e0e0e7957a6b78a827bcd2d13f37afa713d

  • SHA256

    b91195dd162317cf8064a5c6479eb676936d32aca3c0262533a6a143fe0e28d1

  • SHA512

    64dc178003a04a44a3887e136749a2e46e455ca343373d92e8087454cba8c462bdbd04e40164d315bf283174293104d759fc2d38fff4232579d760d9a3f1d114

Malware Config

Targets

    • Target

      f4.jar

    • Size

      57KB

    • MD5

      ae77d6c4c46bbfdaa23c9238d12dcd98

    • SHA1

      4a5e4e0e0e7957a6b78a827bcd2d13f37afa713d

    • SHA256

      b91195dd162317cf8064a5c6479eb676936d32aca3c0262533a6a143fe0e28d1

    • SHA512

      64dc178003a04a44a3887e136749a2e46e455ca343373d92e8087454cba8c462bdbd04e40164d315bf283174293104d759fc2d38fff4232579d760d9a3f1d114

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks