General
-
Target
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01
-
Size
943KB
-
Sample
241022-rpvyzayhmd
-
MD5
6352e630f546c09b45d31db7803373a8
-
SHA1
062289733c62a387d9c808978de7d77c316de465
-
SHA256
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01
-
SHA512
9f4560d5c3be25cf4822d6485bf9540c11dd781ee1918212f269d6b1e1304f6127e3e56cfe5d563b82ca0e45165d282afdb401ae82a2fcbedaadd8531f2917c9
-
SSDEEP
12288:Etb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgazP2bDhRBmPU6A:Etb20pkaCqT5TBWgNQ7azuXXBmU6A
Static task
static1
Behavioral task
behavioral1
Sample
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lokibot
http://www.dobiamfollollc.online:3777/vogxhf/Panel/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01
-
Size
943KB
-
MD5
6352e630f546c09b45d31db7803373a8
-
SHA1
062289733c62a387d9c808978de7d77c316de465
-
SHA256
3c608c14993fca8a9f2ff71fb276fc949392106ec8104a92abee7b5c9c78fc01
-
SHA512
9f4560d5c3be25cf4822d6485bf9540c11dd781ee1918212f269d6b1e1304f6127e3e56cfe5d563b82ca0e45165d282afdb401ae82a2fcbedaadd8531f2917c9
-
SSDEEP
12288:Etb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgazP2bDhRBmPU6A:Etb20pkaCqT5TBWgNQ7azuXXBmU6A
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-