SYMBOLCOMMON_NAMEaka. SYNONYMS
win.bedep (Back to overview)

Bedep


Bedep has been mostly observed in ad-fraud campaigns, although it can also generally load modules for different tasks. It was dropped by the Angler Exploit Kit.

References
2016-05-09Malware Traffic AnalysisBrad Duncan
@online{duncan:20160509:pseudodarkleech:5dff946, author = {Brad Duncan}, title = {{PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX}}, date = {2016-05-09}, organization = {Malware Traffic Analysis}, url = {http://malware-traffic-analysis.net/2016/05/09/index.html}, language = {English}, urldate = {2023-03-23} } PseudoDarkLeech Angler EK from 185.118.66.154 sends Bedep/CryptXXX
Bedep Unidentified 025 (Clickfraud)
2016-04-14Malware Don't Need CoffeeKafeine
@online{kafeine:20160414:bedep:38da8b4, author = {Kafeine}, title = {{Bedep has raised its game vs Bot Zombies}}, date = {2016-04-14}, organization = {Malware Don't Need Coffee}, url = {https://malware.dontneedcoffee.com/2016/04/bedepantiVM.html}, language = {English}, urldate = {2023-03-23} } Bedep has raised its game vs Bot Zombies
Bedep
2016-02-09Talos IntelligenceAlexander Chiu
@online{chiu:20160209:bedep:49a1511, author = {Alexander Chiu}, title = {{Bedep Lurking in Angler's Shadows}}, date = {2016-02-09}, organization = {Talos Intelligence}, url = {https://blog.talosintelligence.com/bedep-actor/}, language = {English}, urldate = {2023-03-23} } Bedep Lurking in Angler's Shadows
Bedep
2015-05-20SentrantSergei Frankoff
@online{frankoff:20150520:bedep:30da731, author = {Sergei Frankoff}, title = {{Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day}}, date = {2015-05-20}, organization = {Sentrant}, url = {https://sentrant.com/2015/05/20/bedep-ad-fraud-botnet-analysis-exposing-the-mechanics-behind-153-6m-defrauded-ad-impressions-a-day/index.html}, language = {English}, urldate = {2022-09-20} } Bedep Ad-Fraud Botnet Analysis – Exposing the Mechanics Behind 153.6M Defrauded Ad Impressions A Day
Bedep
2015-04-21Arbor NetworksDennis Schwarz
@online{schwarz:20150421:bedeps:5608ce2, author = {Dennis Schwarz}, title = {{Bedep’s DGA: Trading Foreign Exchange for Malware Domains}}, date = {2015-04-21}, organization = {Arbor Networks}, url = {https://web.archive.org/web/20150524032716/http://asert.arbornetworks.com/bedeps-dga-trading-foreign-exchange-for-malware-domains/}, language = {English}, urldate = {2023-03-23} } Bedep’s DGA: Trading Foreign Exchange for Malware Domains
Bedep
Yara Rules
[TLP:WHITE] win_bedep_auto (20230715 | Detects win.bedep.)
rule win_bedep_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.bedep."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bedep"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff7508 e8???????? 8bf0 85f6 7449 ff7514 33c0 }
            // n = 7, score = 100
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax
            //   85f6                 | test                esi, esi
            //   7449                 | je                  0x4b
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   33c0                 | xor                 eax, eax

        $sequence_1 = { 0f8cb7000000 837d0c00 7428 807c241300 7511 57 ff35???????? }
            // n = 7, score = 100
            //   0f8cb7000000         | jl                  0xbd
            //   837d0c00             | cmp                 dword ptr [ebp + 0xc], 0
            //   7428                 | je                  0x2a
            //   807c241300           | cmp                 byte ptr [esp + 0x13], 0
            //   7511                 | jne                 0x13
            //   57                   | push                edi
            //   ff35????????         |                     

        $sequence_2 = { 83e0fc 8954ce60 40 40 8944ce64 ff4654 8b4f0c }
            // n = 7, score = 100
            //   83e0fc               | and                 eax, 0xfffffffc
            //   8954ce60             | mov                 dword ptr [esi + ecx*8 + 0x60], edx
            //   40                   | inc                 eax
            //   40                   | inc                 eax
            //   8944ce64             | mov                 dword ptr [esi + ecx*8 + 0x64], eax
            //   ff4654               | inc                 dword ptr [esi + 0x54]
            //   8b4f0c               | mov                 ecx, dword ptr [edi + 0xc]

        $sequence_3 = { 7409 ff742414 e8???????? 84db 7406 8b4508 897010 }
            // n = 7, score = 100
            //   7409                 | je                  0xb
            //   ff742414             | push                dword ptr [esp + 0x14]
            //   e8????????           |                     
            //   84db                 | test                bl, bl
            //   7406                 | je                  8
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   897010               | mov                 dword ptr [eax + 0x10], esi

        $sequence_4 = { 6a00 be???????? 6a04 8bfe e8???????? 8bf8 85ff }
            // n = 7, score = 100
            //   6a00                 | push                0
            //   be????????           |                     
            //   6a04                 | push                4
            //   8bfe                 | mov                 edi, esi
            //   e8????????           |                     
            //   8bf8                 | mov                 edi, eax
            //   85ff                 | test                edi, edi

        $sequence_5 = { 57 8d442410 50 e8???????? 8b35???????? 8d442410 50 }
            // n = 7, score = 100
            //   57                   | push                edi
            //   8d442410             | lea                 eax, [esp + 0x10]
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b35????????         |                     
            //   8d442410             | lea                 eax, [esp + 0x10]
            //   50                   | push                eax

        $sequence_6 = { 83c308 83c308 8bc8 898c1d60f6ffff 89941d6cf6ffff 8b8f90000000 898c1d68f6ffff }
            // n = 7, score = 100
            //   83c308               | add                 ebx, 8
            //   83c308               | add                 ebx, 8
            //   8bc8                 | mov                 ecx, eax
            //   898c1d60f6ffff       | mov                 dword ptr [ebp + ebx - 0x9a0], ecx
            //   89941d6cf6ffff       | mov                 dword ptr [ebp + ebx - 0x994], edx
            //   8b8f90000000         | mov                 ecx, dword ptr [edi + 0x90]
            //   898c1d68f6ffff       | mov                 dword ptr [ebp + ebx - 0x998], ecx

        $sequence_7 = { 740b 8b07 894330 8b4704 894334 8b4514 894338 }
            // n = 7, score = 100
            //   740b                 | je                  0xd
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   894330               | mov                 dword ptr [ebx + 0x30], eax
            //   8b4704               | mov                 eax, dword ptr [edi + 4]
            //   894334               | mov                 dword ptr [ebx + 0x34], eax
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]
            //   894338               | mov                 dword ptr [ebx + 0x38], eax

        $sequence_8 = { 5f 83c40c c3 8be1 8bc2 5f 5e }
            // n = 7, score = 100
            //   5f                   | pop                 edi
            //   83c40c               | add                 esp, 0xc
            //   c3                   | ret                 
            //   8be1                 | mov                 esp, ecx
            //   8bc2                 | mov                 eax, edx
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi

        $sequence_9 = { 50 e8???????? 8d442470 50 6a00 57 }
            // n = 6, score = 100
            //   50                   | push                eax
            //   e8????????           |                     
            //   8d442470             | lea                 eax, [esp + 0x70]
            //   50                   | push                eax
            //   6a00                 | push                0
            //   57                   | push                edi

    condition:
        7 of them and filesize < 557056
}
Download all Yara Rules