- Threat Encyclopedia
- Malware
- BEDEP
Windows
Downloaded from the Internet, Dropped by other malware
BEDEP, also known as ROZENA, increased presence in the first few weeks of 2015. It arrives via websites containing an Adobe Flash exploit. Users are redirected to these websites by malvertisements.
This family of backdoors and Trojans attempt to communicate to various AdFraud servers to access different advertisements in a hidden desktop. BEDEP contains heavy encryption and disguises itself as a Microsoft file through file properties and use of seemingly legitimate export functions.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.
It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.
It requires its main component to successfully perform its intended routine.
Varies
Yes
Connects to URLs/IPs, Downloads files
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It arrives as a component bundled with malware/grayware packages.
Installation
This backdoor injects codes into the following process(es):
Backdoor Routine
This backdoor executes the following commands from a remote malicious user:
It connects to the following websites to send and receive information:
It posts the following information to its command and control (C&C) server:
Download Routine
This backdoor accesses the following websites to download files:
Other Details
This backdoor requires its main component to successfully perform its intended routine.
9.750
NOTES:
Trend customers:
Keep your pattern and scan engine files updated. Trend Micro antivirus software can clean or remove most types of computer threats. Malware, though, such as Trojans, scripts, overwriting viruses and joke programs which are identified as uncleanable, should simply be deleted.
All Internet users: