General

  • Target

    CO R94-04________PDF.jar

  • Size

    59KB

  • Sample

    201126-hykh9z9zqj

  • MD5

    0f2e06b1ab0a16efe82f01d6945b07ed

  • SHA1

    93f0ebd75a154a32a2fa33e67de22b3b2d199dac

  • SHA256

    5a05e869709ef13c58a05df68ab56d011c369eb95924fcc982130b08ea8f613f

  • SHA512

    1f686d7a3e40d976fc6bf7a9f467414d000334809a7903b63e1907863605748aff78e52470aec597cfbd92455110e77401a4dd58f27bcfe49cf89ebdafb12fac

Malware Config

Targets

    • Target

      CO R94-04________PDF.jar

    • Size

      59KB

    • MD5

      0f2e06b1ab0a16efe82f01d6945b07ed

    • SHA1

      93f0ebd75a154a32a2fa33e67de22b3b2d199dac

    • SHA256

      5a05e869709ef13c58a05df68ab56d011c369eb95924fcc982130b08ea8f613f

    • SHA512

      1f686d7a3e40d976fc6bf7a9f467414d000334809a7903b63e1907863605748aff78e52470aec597cfbd92455110e77401a4dd58f27bcfe49cf89ebdafb12fac

    • QNodeService

      Trojan/stealer written in NodeJS and spread via Java downloader.

    • Executes dropped EXE

    • Adds Run key to start application

    • JavaScript code in executable

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks