General
-
Target
q1kuiv.rar
-
Size
2.3MB
-
Sample
240927-xbw7rswgmb
-
MD5
35bd5e55c0b4841b3dbf3872e768aac7
-
SHA1
eab5991a78947ac80a94a5e0d837e30414960ee7
-
SHA256
cfa5c7404f63d519045ea11917e047521f2f3d85dd276286843063b0eac84b27
-
SHA512
88774b9b3292a8af57a54db7761fed13b7647787cb0d27b97afb168364794f056a82cc40759751d12c7bf975af067481dcfa28431e0d4183b8688ce208279e5d
-
SSDEEP
49152:yUz+SJFW6EW0yWUq8Y0eH2ml4SC7MtVda4LHYCK/pbKL0GyXs8qDoAjCWW+:y0FJL0yWUqrx2pdodTLDK/p3XlmG6
Static task
static1
Behavioral task
behavioral1
Sample
q1kuiv.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Goziix Temp.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
certificate.crt
Resource
win10v2004-20240802-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
q1kuiv.rar
-
Size
2.3MB
-
MD5
35bd5e55c0b4841b3dbf3872e768aac7
-
SHA1
eab5991a78947ac80a94a5e0d837e30414960ee7
-
SHA256
cfa5c7404f63d519045ea11917e047521f2f3d85dd276286843063b0eac84b27
-
SHA512
88774b9b3292a8af57a54db7761fed13b7647787cb0d27b97afb168364794f056a82cc40759751d12c7bf975af067481dcfa28431e0d4183b8688ce208279e5d
-
SSDEEP
49152:yUz+SJFW6EW0yWUq8Y0eH2ml4SC7MtVda4LHYCK/pbKL0GyXs8qDoAjCWW+:y0FJL0yWUqrx2pdodTLDK/p3XlmG6
Score3/10 -
-
-
Target
Goziix Temp.exe
-
Size
2.4MB
-
MD5
8fe011b0b10eb4eca5022acf1bed5696
-
SHA1
ac957f46a9ed7fca27103e497f94df55fcc6560f
-
SHA256
ef464cb915f0c3864ea0e274eac67e7fdcf1da7841325248adece8b4a2f6146c
-
SHA512
366b04d4c3a829491ccf2d7abe6c14eaf7d15a6d1a78e8bea6857182c4e9534f5bd91c7c3b7380fe8dc19a0636361ec30639fdc91737ae3f78abe3e06145080b
-
SSDEEP
49152:PY+zMmPITYbNbNWo4kSH3OqtwIjkqXfd+/9Ao8PgsAan:PY+zFPIT4bNJFY3OqtXkqXf0FJ8P3AW
Score3/10 -
-
-
Target
README.txt
-
Size
93B
-
MD5
182931747e988d45c589cdef75ad506e
-
SHA1
bbd2a583dc32412d302cb7f152ca1376040a185b
-
SHA256
1b855a73c2287296c96a90bfad0d9fba22c299b9c034dd9aac1f22df086cd6b8
-
SHA512
c69c50eb64ba19cecdcb6332079239cc694ab328d55478dc37e422c9c7749ece11d2cbce7d7d8945013ba49c75089ac213365a67cbfdbae7de676cc1a235fe06
Score1/10 -
-
-
Target
certificate.crt
-
Size
1KB
-
MD5
e3eff8b29b2d04da7a2e09e214f0949b
-
SHA1
34a05a3e6a8fc1710d22b9fb891f6c7a400c5701
-
SHA256
dfea79c5653186395f8c5c06942471144d1528a2bb0a270321b1a53bcab32f58
-
SHA512
bd7207bed45d100a522228ed21d1bee079e4cbd449369f114a9feda56d0ca7df1fc05c8451454f60b77ae27a12a1467eae667c9f1a992a9dab755dcd7f3344c5
Score8/10-
Blocklisted process makes network request
-
-
-
Target
sexting.exe
-
Size
106KB
-
MD5
e7c1cdf2eeed755911ddc1c00128d2ce
-
SHA1
9286d04e60f000b876ae201c8bb6cde304280199
-
SHA256
667a896324071d75225966c76fea387be6027eaebe5a32006f50eadcf29b23b7
-
SHA512
eb4eb324fb8100c98f4529e97bd5eafc7214b018c79976d6ec48a8ee8c3f9fec83be6390dd9660764566e25413eb624540d7353aa5f45e07957e5ed695ff7e16
-
SSDEEP
1536:D7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIf4w9cOQcGCq2iW7z:f7DhdC6kzWypvaQ0FxyNTBf4IBGCH
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-