General
-
Target
Revision.1.14.exe
-
Size
10.4MB
-
Sample
250126-rakvfstjas
-
MD5
e25e39744775a8a636866cc7bc446640
-
SHA1
9258197f2960a19f6412861fcdee2eb65ea33704
-
SHA256
d28b5ac49d1df2d04f5c918c3584772efea9260ee514cf0062ea7936ffbc1195
-
SHA512
b567e820813c78dc7a0864b557cdb8ff9846915fb1d2e6a3c3ddf031a77c4a2b376d6973b35b117ff97a00e690fed432bfbb236da526c824247ab331f6870c86
-
SSDEEP
196608:WMz28dVl/fzCdDNU/9onJ5hrZEK3e9tGPqKM48RmU/qZlsPv4TbqM/xBfmxMoK5j:km9c5hlEK/PNMtNqZW43rDoK5BN
Behavioral task
behavioral1
Sample
Revision.1.14.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Revision.1.14.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
Revision.1.14.exe
-
Size
10.4MB
-
MD5
e25e39744775a8a636866cc7bc446640
-
SHA1
9258197f2960a19f6412861fcdee2eb65ea33704
-
SHA256
d28b5ac49d1df2d04f5c918c3584772efea9260ee514cf0062ea7936ffbc1195
-
SHA512
b567e820813c78dc7a0864b557cdb8ff9846915fb1d2e6a3c3ddf031a77c4a2b376d6973b35b117ff97a00e690fed432bfbb236da526c824247ab331f6870c86
-
SSDEEP
196608:WMz28dVl/fzCdDNU/9onJ5hrZEK3e9tGPqKM48RmU/qZlsPv4TbqM/xBfmxMoK5j:km9c5hlEK/PNMtNqZW43rDoK5BN
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Possible privilege escalation attempt
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
1