General
-
Target
455c792d602c9bff99be0631cc30cae0c997a5f2bae804274ddad10b9af39f84
-
Size
1.3MB
-
Sample
241017-wtqx2a1drk
-
MD5
bc020f08f3dbdceb42574f4d4ff84760
-
SHA1
c52ca0fd930f7702b99e8833d5dc017cf73a30e2
-
SHA256
455c792d602c9bff99be0631cc30cae0c997a5f2bae804274ddad10b9af39f84
-
SHA512
86d4bcb278ea0547fa44ef2c853ce5c8c583f0b4fb5174aed95ca95a5414c4db24e571ea62733fc8aaddd39472dcf26d4bab38ac8317512a7593c68f1e267afa
-
SSDEEP
24576:nBXu9HGaS1c4WK5FRUO75CBg5/XWoGYNImnqKF8/M/2pe7qq7apCBJT:nw9SdWK5rUO75F/H2R/NWqquOJ
Behavioral task
behavioral1
Sample
455c792d602c9bff99be0631cc30cae0c997a5f2bae804274ddad10b9af39f84.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
455c792d602c9bff99be0631cc30cae0c997a5f2bae804274ddad10b9af39f84
-
Size
1.3MB
-
MD5
bc020f08f3dbdceb42574f4d4ff84760
-
SHA1
c52ca0fd930f7702b99e8833d5dc017cf73a30e2
-
SHA256
455c792d602c9bff99be0631cc30cae0c997a5f2bae804274ddad10b9af39f84
-
SHA512
86d4bcb278ea0547fa44ef2c853ce5c8c583f0b4fb5174aed95ca95a5414c4db24e571ea62733fc8aaddd39472dcf26d4bab38ac8317512a7593c68f1e267afa
-
SSDEEP
24576:nBXu9HGaS1c4WK5FRUO75CBg5/XWoGYNImnqKF8/M/2pe7qq7apCBJT:nw9SdWK5rUO75F/H2R/NWqquOJ
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-