General
-
Target
SecuriteInfo.com.Generic.mg.0d039208c1658b3f.16741
-
Size
3.8MB
-
Sample
200725-d96h3a6x3n
-
MD5
0d039208c1658b3fc0c7bd9679a1744d
-
SHA1
adf1b4f1c00301f325036086a882bdb145002588
-
SHA256
aae91b20323629b5d0c4a1ed5ad5cf5383730f5233433eba7b450eafec503501
-
SHA512
3e97398f5db4c4549dac9d375e07d4acfc236e477c005d37870b5094d37c27878ab53ad8fadae98fd6f5f3cfc587f0387a2b47a6678234eda3a926797ee23496
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.0d039208c1658b3f.16741.exe
Resource
win7v200722
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Generic.mg.0d039208c1658b3f.16741
-
Size
3.8MB
-
MD5
0d039208c1658b3fc0c7bd9679a1744d
-
SHA1
adf1b4f1c00301f325036086a882bdb145002588
-
SHA256
aae91b20323629b5d0c4a1ed5ad5cf5383730f5233433eba7b450eafec503501
-
SHA512
3e97398f5db4c4549dac9d375e07d4acfc236e477c005d37870b5094d37c27878ab53ad8fadae98fd6f5f3cfc587f0387a2b47a6678234eda3a926797ee23496
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-