Bedep
Posted: February 12, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Ranking: | 5,922 |
---|---|
Threat Level: | 6/10 |
Infected PCs: | 11,104 |
First Seen: | January 22, 2015 |
---|---|
Last Seen: | October 17, 2023 |
OS(es) Affected: | Windows |
Bedep is a family of Trojan downloaders and botnet utilities that may install other threats, subvert your PC's system resources for other illicit activities, or generate fake advertising traffic. While members of Bedep can circulate by multiple means, some of the latest attacks verified by malware researchers traced Bedep to compromised advertising networks hosting Swifti, a Flash Trojan. In addition to the usual recommendations of using anti-malware products to detect and delete Bedep, you also may want to avoid using Internet Explorer, the sole browser vulnerable to Swifti's assaults.
The Depth of Bedep's Malware Rabbit Hole
Bedep is one of the many Trojans used, first and foremost, for installing other Trojans and threats. Bedep also may be connected to the exploitation of an infected PC's resources for creating fake advertisement traffic, or for initiating a backdoor connection with botnet servers that could launch coordinated, large-scale attacks. Some major threat families that malware researchers see Bedep installing include:
- Zemot and Dofoil, two other types of Trojan downloaders. Zemot often installs sophisticated spyware, such as Zeus.
- Ursnif, a spyware family that steals private information, including passwords and digital certificates.
While some unrelated Trojans, such as F0xy, prefer to 'hide in plain sight' by avoiding any code obfuscation, Bedep makes considerable use of encryption to protect itself from being detected. Bedep installs its previously-explained payload automatically and also installs itself through similar attacks, using Swifti.
Swifti was last seen circulating throughout compromised advertising networks hosted on legitimate websites, and uses a zero-day (or unpatched) Flash vulnerability to install Bedep. In theory, Swifti also could install more threats in addition to Bedep, or in exclusion to it.
Since third parties can reconfigure their botnets for diverse purposes, other symptoms or ill effects from Bedep infections are unpredictable and may vary in terms of the consequential damage to your privacy or PC.
Blocking the Trojan that could be in Your PC in a Flash
Only Internet Explorer users are vulnerable to current delivery methods used by Bedep and Swifti, although similar Flash-based attacks have been viable in other browsers. For PC users who refuse to switch browsers or block advertisements, disabling Flash may prove to be the most urgent priority, until Adobe can release a security patch. Just like threat-installing attacks originating from Bedep infections, the attacks that install Bedep Trojans are unlikely to display symptoms visible to casual inspection. Regular anti-malware scans are preferable to identifying and removing Bedep or its payloads.
After dealing with Bedep, the integrity of your informational privacy also should be considered. Changing all passwords and other, exploitable information stored on your computer isn't necessarily mandatory, but could prevent third parties from using Bedep's successes to conduct other attacks that hijack your accounts or cause other damages.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:fe2e645776280d03def4afa7070952a34c234acd7e8d529bcd2e27511f5a312d.exe
File name: fe2e645776280d03def4afa7070952a34c234acd7e8d529bcd2e27511f5a312d.exeSize: 270.84 KB (270848 bytes)
MD5: 12a91cb80a5c38cf1d3dfd24fbc09430
Detection count: 85
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
fbc36c1cd8b9e8885f894daba620bb97bd1bf3af527396edb7723e2f9f5f8a68.exe
File name: fbc36c1cd8b9e8885f894daba620bb97bd1bf3af527396edb7723e2f9f5f8a68.exeSize: 314.88 KB (314880 bytes)
MD5: e5d4caec558af692d7930d60f34f68ee
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
f6242dd236ef360220ee5ef6b47c3a4c05f122fa681313e7c5e7734bcbf8b624.exe
File name: f6242dd236ef360220ee5ef6b47c3a4c05f122fa681313e7c5e7734bcbf8b624.exeSize: 319.48 KB (319488 bytes)
MD5: 5df249e246f889b1d10a737728135cb3
Detection count: 81
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
d662f3e7fe3ffb9f1ad8135eef93b01bdceff8ae693cffb8c2c4101a339dcdb8.exe
File name: d662f3e7fe3ffb9f1ad8135eef93b01bdceff8ae693cffb8c2c4101a339dcdb8.exeSize: 304.64 KB (304640 bytes)
MD5: b4ce1ef1de0ea5354ec4c6cb3fd31f54
Detection count: 76
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
cf57b3a289ad32d4ee6550d539a0bd8f2a031c0596fdc9240f8c26db02529e99.exe
File name: cf57b3a289ad32d4ee6550d539a0bd8f2a031c0596fdc9240f8c26db02529e99.exeSize: 315.9 KB (315904 bytes)
MD5: ef2640a2bfa57a7ef281f815e9f98a2e
Detection count: 74
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
be9ba85eef3c8f113a08aa127093020f901fe833d0540727bfd8fa390937c43f.exe
File name: be9ba85eef3c8f113a08aa127093020f901fe833d0540727bfd8fa390937c43f.exeSize: 309.76 KB (309760 bytes)
MD5: 98d7056200f1c43c9e9d0c2cd1e1b25c
Detection count: 73
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
b31a370383308efab127cc0b5bb2a8161c5de232d8c48a9cfce2049568747aab.exe
File name: b31a370383308efab127cc0b5bb2a8161c5de232d8c48a9cfce2049568747aab.exeSize: 320.51 KB (320512 bytes)
MD5: d432041e281148d5fb3306c5a15f6f36
Detection count: 71
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
b2e18acd6ba6937da5c49d18e868ea99f45e15557c773e7f45929fe6f6a4c98b.exe
File name: b2e18acd6ba6937da5c49d18e868ea99f45e15557c773e7f45929fe6f6a4c98b.exeSize: 306.68 KB (306688 bytes)
MD5: 3983908ec5639ba900c4f0a31f7b35d7
Detection count: 70
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
9bf71590e07813df52989ea7eab146dffd9dce9ffe93aab40e3a8bacd40fc579.exe
File name: 9bf71590e07813df52989ea7eab146dffd9dce9ffe93aab40e3a8bacd40fc579.exeSize: 334.33 KB (334336 bytes)
MD5: 802c3cd2758654b7a73bea84659104d1
Detection count: 66
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
9b0d9aadc62c192b6fcff910caada118738c41f16f74e718a8c0171707250074.exe
File name: 9b0d9aadc62c192b6fcff910caada118738c41f16f74e718a8c0171707250074.exeSize: 296.96 KB (296964 bytes)
MD5: a927a3d2ad3cbeb2e62262e8d3b3b47d
Detection count: 65
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
9902b7243adce607399eff377d531a651625bfd01b5c324959f162847f1edf33.exe
File name: 9902b7243adce607399eff377d531a651625bfd01b5c324959f162847f1edf33.exeSize: 296.96 KB (296964 bytes)
MD5: c5ef964291627e83639bc475d7da44dc
Detection count: 63
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
95525ee68803bc5cc3ee542a592cccf0053247c023c61bbd2775313658f827f0.exe
File name: 95525ee68803bc5cc3ee542a592cccf0053247c023c61bbd2775313658f827f0.exeSize: 315.39 KB (315392 bytes)
MD5: d288a4885a236b4fa7cbd3ca3a925dc3
Detection count: 62
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
93053d4261d0d9e0a832a48484d19af8205d4d686b15e4f2900256d9d82f4fd9.exe
File name: 93053d4261d0d9e0a832a48484d19af8205d4d686b15e4f2900256d9d82f4fd9.exeSize: 345.6 KB (345600 bytes)
MD5: a5235035ed1f18def64ee9b90a62f85c
Detection count: 61
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
8a8daa131de48f14f7ad9fece9ec734e167a9f35389e7f097d036ed6cafdcd4c.exe
File name: 8a8daa131de48f14f7ad9fece9ec734e167a9f35389e7f097d036ed6cafdcd4c.exeSize: 315.39 KB (315392 bytes)
MD5: 458ba0984ae8f6a7176f33442eaaadb7
Detection count: 60
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
5fbf20d50b8bde8915016cb414392e885574592c7e673c6be1654796168414b2.exe
File name: 5fbf20d50b8bde8915016cb414392e885574592c7e673c6be1654796168414b2.exeSize: 344.58 KB (344580 bytes)
MD5: c6bdc9e1f594ca4f8134da9cb94f988b
Detection count: 54
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
5cfc7667857c03e5bb43b4ea5436c86299adaab771f01695617a86caf4b64246.exe
File name: 5cfc7667857c03e5bb43b4ea5436c86299adaab771f01695617a86caf4b64246.exeSize: 308.22 KB (308224 bytes)
MD5: e54e7d2323a16d7bc481cc19927d945f
Detection count: 53
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
51cfbc5a961745b635e48f252bd4b644cf47d0190c90d976c08c6251f3ee5add.exe
File name: 51cfbc5a961745b635e48f252bd4b644cf47d0190c90d976c08c6251f3ee5add.exeSize: 344.58 KB (344580 bytes)
MD5: d0a9a1b70f2725acc38c473a2d3805f0
Detection count: 51
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
4cf3a689b6282a7b3b47309040f9d39a5b9189d59ac8a1d2d37936dfa5715f23.exe
File name: 4cf3a689b6282a7b3b47309040f9d39a5b9189d59ac8a1d2d37936dfa5715f23.exeSize: 360.44 KB (360448 bytes)
MD5: 886599dcc08fcc8947237f4c755ee7ae
Detection count: 50
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
121ba5f7b57d9c34ac0e810ba3d8bc260bf9203bd0d9b91a516b7d83e615b001.exe
File name: 121ba5f7b57d9c34ac0e810ba3d8bc260bf9203bd0d9b91a516b7d83e615b001.exeSize: 314.36 KB (314368 bytes)
MD5: aa24ac5e9ba18419d675dc5b3fb91e1c
Detection count: 42
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
0b05a9071cbda6201c868392c542895bbf831055512ea0041a698fa7cd309a61.exe
File name: 0b05a9071cbda6201c868392c542895bbf831055512ea0041a698fa7cd309a61.exeSize: 315.39 KB (315392 bytes)
MD5: 33e277c0a7ce79f145b30cd16ca1d097
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
01eff55c3adb654afa33bee64578bd8706086f5277a76600c8d76956763bfc89.exe
File name: 01eff55c3adb654afa33bee64578bd8706086f5277a76600c8d76956763bfc89.exeSize: 344.58 KB (344580 bytes)
MD5: d0aa4d1a826fd98303c488bdedde9c2a
Detection count: 36
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: March 15, 2016
More files
Registry Modifications
CLSID{2D349E57-23E4-4A67-9624-F1DC6B65AABF}{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}HKEY..\..\..\..{RegistryKeys}Software\Classes\Drive\ShellEx\FolderExtensions\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.