General
-
Target
c12f8d1207373ebd80281f7318252277eda3bd5e2df613c16d1ecaf0d9926d65
-
Size
11.5MB
-
Sample
241107-tsg8dswakr
-
MD5
da97e36f297408ab3985c77c03db813b
-
SHA1
8881c640e7f019c0f00046db891a702c783520b8
-
SHA256
c12f8d1207373ebd80281f7318252277eda3bd5e2df613c16d1ecaf0d9926d65
-
SHA512
53ee832dbb6ec6962c21c9d49b8329958c8e769c74bfab69d320e57e895fc6e5532bb08df582aa809093be7171b09a2d15232ebaf59733b7ebe9c43bdce91f4b
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
Behavioral task
behavioral1
Sample
c12f8d1207373ebd80281f7318252277eda3bd5e2df613c16d1ecaf0d9926d65.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
c12f8d1207373ebd80281f7318252277eda3bd5e2df613c16d1ecaf0d9926d65
-
Size
11.5MB
-
MD5
da97e36f297408ab3985c77c03db813b
-
SHA1
8881c640e7f019c0f00046db891a702c783520b8
-
SHA256
c12f8d1207373ebd80281f7318252277eda3bd5e2df613c16d1ecaf0d9926d65
-
SHA512
53ee832dbb6ec6962c21c9d49b8329958c8e769c74bfab69d320e57e895fc6e5532bb08df582aa809093be7171b09a2d15232ebaf59733b7ebe9c43bdce91f4b
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-