General
-
Target
86af40c4db7e63743cabca0bc02a4f9510c520037dea220d27077d193892094c
-
Size
11.5MB
-
Sample
241128-hr7k4szjb1
-
MD5
0980fae0b6dfe0eebcbdb601748f7145
-
SHA1
72b9724b955ebbd0867c3796e2952c6749991d14
-
SHA256
86af40c4db7e63743cabca0bc02a4f9510c520037dea220d27077d193892094c
-
SHA512
bd54fa0274fb28b31a04a624dd299821161a3cb0503ddf2ecc609b78691f517e467b9e2e897e1b41146b903db5e313844f0a89dfcfaf44350d3f0a0ad48f2f23
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
Behavioral task
behavioral1
Sample
86af40c4db7e63743cabca0bc02a4f9510c520037dea220d27077d193892094c.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
86af40c4db7e63743cabca0bc02a4f9510c520037dea220d27077d193892094c
-
Size
11.5MB
-
MD5
0980fae0b6dfe0eebcbdb601748f7145
-
SHA1
72b9724b955ebbd0867c3796e2952c6749991d14
-
SHA256
86af40c4db7e63743cabca0bc02a4f9510c520037dea220d27077d193892094c
-
SHA512
bd54fa0274fb28b31a04a624dd299821161a3cb0503ddf2ecc609b78691f517e467b9e2e897e1b41146b903db5e313844f0a89dfcfaf44350d3f0a0ad48f2f23
-
SSDEEP
196608:FAQuVH3M82sRhWphk2XmH24Wgf7TInXinHuE50PbdtwsmrKVveZleGxzLVyyqg:GLxM8r22PvInXinHuK0xCKVvetRVl
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-