Overview
overview
10Static
static
3Spoofer/Ca...er.exe
windows7-x64
1Spoofer/Ca...er.exe
windows10-2004-x64
1Spoofer/Ca...er.sys
windows10-2004-x64
1Spoofer/Re...g1.exe
windows7-x64
10Spoofer/Re...g1.exe
windows10-2004-x64
10Spoofer/Re...g2.exe
windows7-x64
10Spoofer/Re...g2.exe
windows10-2004-x64
10Spoofer/Re...g3.exe
windows7-x64
7Spoofer/Re...g3.exe
windows10-2004-x64
8General
-
Target
Spoofer.rar
-
Size
9.4MB
-
Sample
241012-tbc74sybna
-
MD5
dd1f7eeba35048af94ef7c2737cfb89a
-
SHA1
fa652d2b7adf5e9982720e08ac17c9fecfe95a03
-
SHA256
13c739544e392920c0e108aed613c98f097f985631c6cc118d796fcee59bab17
-
SHA512
7b608452151bc5fb57641205002152c3e893d5e824b0308d7fad921b5dedf711c571a123f4eb99b12552e92425b113ead546822d2a850ecbfc013c85512ee521
-
SSDEEP
196608:4WfGSWpkN/fz0a0XBlIau9Kv9L3Far7Oo17hI+VqA4beiQX6glI4:iTkND0zRlGo1AvlrqA4VQz
Behavioral task
behavioral1
Sample
Spoofer/Cambiador de serial/kdmapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Spoofer/Cambiador de serial/kdmapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Spoofer/Cambiador de serial/spoofer.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Spoofer/Remover Logs/log1.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Spoofer/Remover Logs/log1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Spoofer/Remover Logs/log2.exe
Resource
win7-20240729-en
Behavioral task
behavioral7
Sample
Spoofer/Remover Logs/log2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Spoofer/Remover Logs/log3.exe
Resource
win7-20240708-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
Spoofer/Cambiador de serial/kdmapper.exe
-
Size
107KB
-
MD5
d63c0a558ae60ae055d8f2aae1d0a494
-
SHA1
51ed78431c44402abcea6913ecf845e1662777ba
-
SHA256
779411d073c1aaefc7df224c9e972fd3ea848944b7fa92412c5cd71da512a729
-
SHA512
c2f421be696ac398d158a9da6fe6586b7bd1f528bc94f7b295d65f12d515584c4d78cb901ae667c925f60182e62815fe8c64b95c6806f95cd2facfd4db52f55b
-
SSDEEP
3072:Yppjdz7eqQfZ8G7A5G390uDmJTQSaMm5/6lWOax9gg:YppjdPsZ8qqWlQWx3
Score1/10 -
-
-
Target
Spoofer/Cambiador de serial/spoofer.sys
-
Size
11KB
-
MD5
ece894602ee9353cce23dc4ece8a5445
-
SHA1
ba600000eb12f543516576035e4bb25dc5628b46
-
SHA256
93a516ebdd6bb1fe9dc5951b21fbacdff660997548bbb3df57dba92417caa33d
-
SHA512
0ad350f2d52e1b2c6f3b9a76cfcdb29307de22ea19ca71ab6cdea80350882eadb5ccf68d317360924fdd166ebd32eb2997167466c4407a2b5c45f4e6db7acc89
-
SSDEEP
192:QreOkMkNIcwT4ZdVynlkR2N6quhu58JLTWY4fuo5XDNboli:weuPnlkR2N6b3LTS0i
Score1/10 -
-
-
Target
Spoofer/Remover Logs/log1.exe
-
Size
107KB
-
MD5
990683bf20e4c23e92f988992e64b1f2
-
SHA1
782fa1c9d964b70881a896504c9822ea44aeee0f
-
SHA256
0b848b847ec52d4037c9a4ccb108fed8b877d93f13f20b089f327f2385043b88
-
SHA512
389760fa7fe3a7ecaa22cd0082ed58a3ba5bd18c88fe976a64c79b81a7ccdd14d9de48c3a3835eceadfd8f517997159a3208afc6a076f1f5693cf3f4b5ff72eb
-
SSDEEP
1536:57fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfqwqO08GCq2iW7z:t7DhdC6kzWypvaQ0FxyNTBfqqGCH
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
Spoofer/Remover Logs/log2.exe
-
Size
107KB
-
MD5
fc0cf51e23828300811b9279e641e65f
-
SHA1
7c4d0b7efe4e9648e1e13625255e4d00c65dda73
-
SHA256
a8ebd91e787da7058191684de95648495d391090aa617c7d8ab7949b1a2d10c6
-
SHA512
08a460191d6d07c84dc9c9c7f2c0d9df2f33c5df07be441637cbe04a1e93758de2a7189d543b7a00a5e5e0ef44f42603fc78f88b75493ffde58992cf39216eb4
-
SSDEEP
1536:57fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfrw4xON1GCq2iW7z:t7DhdC6kzWypvaQ0FxyNTBfr0GCH
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
Spoofer/Remover Logs/log3.exe
-
Size
9.4MB
-
MD5
79fd04395a1df6c2dc3f46dac43e2682
-
SHA1
4a69dfe95ef2901ec1afc63bbc2b9817bee26455
-
SHA256
d9ca44315aaffd331091ae3c106601e3daaaa778868105257f3d8b21074cbff1
-
SHA512
28140df85b1d65b83f0f340cadbf14eb10b35ea5b4ea72ac5f0c08d704febbbfbe6d32ffbd90a4df4a3df04a2d755285f163de38e7f77ff78ab2638da6f89564
-
SSDEEP
196608:Fjv3QkY8XMCHGLLc54i1wN+rPIcu9KYK39sevBare+3PP+VMwxCEc/j:tvtXMCHWUjMcuIhv4e+/P+VA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-