General
-
Target
e4a719c3efa888ae091f47a3780b88bb55d7ec53e69beed192100ac2a83efedf
-
Size
11.5MB
-
Sample
241107-tls2bavhlj
-
MD5
962cb1ff9baee7c0a3e46fb76f4fa3cb
-
SHA1
62d96fc4bd2ed1389a28012876b5d3976243ff39
-
SHA256
e4a719c3efa888ae091f47a3780b88bb55d7ec53e69beed192100ac2a83efedf
-
SHA512
7a3a399aea61c3fdbc833819c6cb0d7f3cecdc93fa3424b860d0df23e09daa5e63f4684a295750424d0a38e0e113fa50b5dd6b5fc0ff0f26827f1ce249997263
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
Behavioral task
behavioral1
Sample
e4a719c3efa888ae091f47a3780b88bb55d7ec53e69beed192100ac2a83efedf.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
e4a719c3efa888ae091f47a3780b88bb55d7ec53e69beed192100ac2a83efedf
-
Size
11.5MB
-
MD5
962cb1ff9baee7c0a3e46fb76f4fa3cb
-
SHA1
62d96fc4bd2ed1389a28012876b5d3976243ff39
-
SHA256
e4a719c3efa888ae091f47a3780b88bb55d7ec53e69beed192100ac2a83efedf
-
SHA512
7a3a399aea61c3fdbc833819c6cb0d7f3cecdc93fa3424b860d0df23e09daa5e63f4684a295750424d0a38e0e113fa50b5dd6b5fc0ff0f26827f1ce249997263
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-