General
-
Target
8d0dbd66ca7faf9ca9694abe3a4dcd16b879cf5fe098f98b8684d4c85e97a3a3
-
Size
11.5MB
-
Sample
241107-spp86atpfz
-
MD5
02454b345201877b5be772496d7e7c53
-
SHA1
1cbdca3c61f76600b4d381ad5194089279706db5
-
SHA256
8d0dbd66ca7faf9ca9694abe3a4dcd16b879cf5fe098f98b8684d4c85e97a3a3
-
SHA512
ce16c022fe64ed66be259ad1639d27635c615f70b93ba19d6758ea91bc35cc97c5ab419c5010bd783f9b234ab2b9b256461031dd27a4ddd444871db7d2914b39
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
Behavioral task
behavioral1
Sample
8d0dbd66ca7faf9ca9694abe3a4dcd16b879cf5fe098f98b8684d4c85e97a3a3.exe
Resource
win7-20240708-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
8d0dbd66ca7faf9ca9694abe3a4dcd16b879cf5fe098f98b8684d4c85e97a3a3
-
Size
11.5MB
-
MD5
02454b345201877b5be772496d7e7c53
-
SHA1
1cbdca3c61f76600b4d381ad5194089279706db5
-
SHA256
8d0dbd66ca7faf9ca9694abe3a4dcd16b879cf5fe098f98b8684d4c85e97a3a3
-
SHA512
ce16c022fe64ed66be259ad1639d27635c615f70b93ba19d6758ea91bc35cc97c5ab419c5010bd783f9b234ab2b9b256461031dd27a4ddd444871db7d2914b39
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-