Malware-Traffic-Analysis.net - 2017-07-04 - Java-based RAT infection Archived: 2026-04-05 16:41:27 UTC NOTICE: The zip archives on this page have been updated, and they now use the new password scheme.  For the new password, see the "about" page of this website. ASSOCIATED FILES: 2017-07-04-Java-based-RAT-email-and-malware.zip   1.5 MB (1,506,906 bytes) 2017-07-04-malspam-0433-UTC.eml   (946,555 bytes) INVOICE LIST.jar   (578,829 bytes) _0.325390945828089142947081810060995233.class   (247,088 bytes) EMAIL SCREENSHOT: http://malware-traffic-analysis.net/2017/07/04/index.html Page 1 of 5 Shown above:  Screenshot of the email. EMAIL HEADER INFO: Received: from [162.144.89[.]147] ([162.144.89[.]147:36560] helo=server.joshmachines[.]com)         by [removed] (envelope-from )         [removed]; Tue, 04 Jul 2017 01:42:30 -0400 Received: from [127.0.0.1] (port=45926 helo=harshangzaveri[.]com)         by server.joshmachines[.]com with esmtpa (Exim 4.89)         (envelope-from )         id 1dSFWO-0008CV-Tu; Tue, 04 Jul 2017 04:33:09 +0000 MIME-Version: 1.0 Date: Tue, 04 Jul 2017 04:33:08 +0000 From: Sales To: undisclosed-recipients:; Subject: Unpaid Invoice List Reply-To: sales@foodtech[.]ae http://malware-traffic-analysis.net/2017/07/04/index.html Page 2 of 5 Mail-Reply-To: sales@foodtech[.]ae Message-ID: X-Sender: sales@foodtech[.]ae User-Agent: Roundcube Webmail/1.2.4 Attachment: INVOICE LIST.jar TRAFFIC Shown above:  Traffic from an infection filtered in Wireshark. POST-INFECTION TRAFFIC: 191.101.22[.]49 port 3020 - attempted TCP connections, but RST from the server. FILE HASHES EMAIL ATTACHMENT: SHA256 hash:  9863c850c213dee716dc5954bb0f28a1c480cf0435e93110824cb083fd4bdda5 File name:  INVOICE LIST.jar File size:  578,829 bytes ARTIFACT FOUND IN USER'S APPDATA\LOCAL\TEMP DIRECTORY: SHA256 hash:  97d585b6aff62fb4e43e7e6a5f816dcd7a14be11a88b109a9ba9e8cd4c456eb9 File name:  _0.325390945828089142947081810060995233.class File size:  247,088 bytes IMAGES http://malware-traffic-analysis.net/2017/07/04/index.html Page 3 of 5 Shown above:  Contents of the email attachment. Shown above:  Windows registry change to make the malware persistent after a reboot. http://malware-traffic-analysis.net/2017/07/04/index.html Page 4 of 5 Shown above:  Two .class files with the same file hash found in the user's AppData\Local\Temp directory after this infection. Click here to return to the main page. Source: http://malware-traffic-analysis.net/2017/07/04/index.html http://malware-traffic-analysis.net/2017/07/04/index.html Page 5 of 5