General

  • Target

    QOUTE.jar

  • Size

    402KB

  • Sample

    200712-zt3jhc18fs

  • MD5

    0a79ac74d72bd78b14f2620336eb8154

  • SHA1

    cb35e25fd05a342c3201cc7e7c81aa4f7fca99f7

  • SHA256

    b52f595bcd319fb9a253efa0c694fcaea8662b0fd34bb384612c1006cc112bd8

  • SHA512

    7b74e2c7568a38045c1d760589193e716767e568809391980df03f197515ced2c535ad0d1612e5d05f56ab1684b4bbae562764606a96106909c00e848ccf784a

Malware Config

Targets

    • Target

      QOUTE.jar

    • Size

      402KB

    • MD5

      0a79ac74d72bd78b14f2620336eb8154

    • SHA1

      cb35e25fd05a342c3201cc7e7c81aa4f7fca99f7

    • SHA256

      b52f595bcd319fb9a253efa0c694fcaea8662b0fd34bb384612c1006cc112bd8

    • SHA512

      7b74e2c7568a38045c1d760589193e716767e568809391980df03f197515ced2c535ad0d1612e5d05f56ab1684b4bbae562764606a96106909c00e848ccf784a

    • Modifies Windows Defender Real-time Protection settings

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Checks for installed software on the system

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

2
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

1
T1089

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks