Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- THREAT ATTRIBUTION: QNODESERVICE
- SUBJECTS OBSERVED
- Overdue Invoice
- SENDERS OBSERVED
- Account Receivable <resosa@kamometour[.]co[.]jp>
- EMAIL BODY
- Hi,
- Please find attached our overdue invoice for payment.
- Should you have any queries do not hesitate to contact me.
- Kind Regards,
- Accounts Receiveable
- ________________________________
- Confidentiality Notice: This e-mail transmission may contain confidential or legally privileged information intended only for the individual or entity named in the e-mail address. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or reliance upon the contents of this e-mail is strictly prohibited. If you have received this e-mail transmission in error, please delete the message from your inbox. Thank you.
- ________________________________
- Please note that the content of this e-mail is intended only for the confidential use of the person(s) to whom it is addressed above. If the reader of this e-mail is not the person to whom it is addressed, you are hereby notified that you have received this communication in error and that reading it, copying it, or in any way disseminating its content to any other person, is strictly prohibited. If you have received this e-mail in error, please notify the author by using the reply key immediately.
- HTML FILE HASH
- Legal_Proceeding_concerning_Overdue_invoices_pdf.html
- d3c1118c1661513b5687a850ced4e690
- JAR FILE HASH
- Legal_Proceeding_concerning_Overdue_invoices_pdf.jar
- 9ea1bfe46a31e9d5a3f6f1908787b06c
- JAVASCRIPT FILE HASH
- wizard[.]js
- 87bbeb86ed0193965f361f9799febb16
- CMD FILE HASH
- qnodejs-962b69d8[.]cmd
- b009cf56f71a0922ef6d6f11439bf614
- ADDITIONAL IOCs
- user:1168@qhub-subscription[.]store[.]qua[.]one
- QNODESERVICE PAYLOAD URL
- hxxps://legalproceedings[.]uc[.]r[.]appspot[.]com/Legal_Proceeding_concerning_Overdue_invoices_pdf[.]jar
- QNODESERVICE C2
- environment[.]spdns[.]org:443
- environment[.]theworkpc[.]com:443
- SUPPORTING EVIDENCE
- https://blog.trendmicro.com/trendlabs-security-intelligence/qnodeservice-node-js-trojan-spread-via-covid-19-lure/
Add Comment
Please, Sign In to add comment