General

  • Target

    AliIM_taobao_(9.12.10C).exe

  • Size

    70.6MB

  • Sample

    210120-tqgc7gvd2x

  • MD5

    548fe76c892c83cec71ed55fb7a763a5

  • SHA1

    06e261f877eeb1f03b497db538f8a24be2620cef

  • SHA256

    1b11b19a2c2ced01a0b6681e353e8a1d2c2948f1c9aeafd88c2a84d571cc4154

  • SHA512

    a91e33f8ba2aa7e2af72fc202b05fe2302f4e3bd8523bbf9f6a81f643e28c7dc2c603afd732efd59840137d3b0ca5ecf4334ac0e02c3d075c6f348d7202ad2eb

Malware Config

Targets

    • Target

      AliIM_taobao_(9.12.10C).exe

    • Size

      70.6MB

    • MD5

      548fe76c892c83cec71ed55fb7a763a5

    • SHA1

      06e261f877eeb1f03b497db538f8a24be2620cef

    • SHA256

      1b11b19a2c2ced01a0b6681e353e8a1d2c2948f1c9aeafd88c2a84d571cc4154

    • SHA512

      a91e33f8ba2aa7e2af72fc202b05fe2302f4e3bd8523bbf9f6a81f643e28c7dc2c603afd732efd59840137d3b0ca5ecf4334ac0e02c3d075c6f348d7202ad2eb

    • Registers COM server for autorun

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks