Threat Database Backdoors Backdoor.Bifrose

Backdoor.Bifrose

By GoldSparrow in Backdoors
Translate To:

Threat Scorecard

Popularity Rank: 23,553
Threat Level: 60 % (Medium)
Infected Computers: 1,321
First Seen: July 24, 2009
Last Seen: January 19, 2026
OS(es) Affected: Windows

Backdoor.Bifrose (sometimes referred to as Bifrose) is a backdoor Trojan that provides an unauthorized user with remote access, and in some cases complete control, of your system. Thus Backdoor.Bifrose places any and all personal information data at great risk of being stolen, while other files may be uploaded, downloaded and deleted from your hard drive. Computer security and stability may be further degraded as Backdoor.Bifrose may download other malicious applications.

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
AVG Generic25.CJCV
Fortinet W32/BDoor.CEP!tr.bdr
AhnLab-V3 Trojan/Win32.ADH
AntiVir BDS/Bifrose.A.394
Kaspersky Trojan.Win32.Midgare.bbsz
ClamAV Trojan.Midgare-167
CAT-QuickHeal Trojan.Midgare.bbsz
Panda Trj/Thed.M
AVG Generic5_c.BUVP
TrendMicro TROJ_SPNR.11I612
F-Secure Gen:Variant.Barys.1607
eSafe Win32.GenVariant.Kaz
McAfee BackDoor-FACW!FEA05B1E642B
AVG Generic5_c.AUMF
AhnLab-V3 Backdoor/Win32.Buzy

SpyHunter Detects & Remove Backdoor.Bifrose

File System Details

Backdoor.Bifrose may create the following file(s):
# File Name MD5 Detections
1. KEYGEN.EXE c78823c750512ab280b62ec17ee2173a 567
2. wuauclt.exe 2e2d0c602a60fba0ee1f3c68d2532237 76
3. csrs.exe a94dc5a0361bb54f4c40abf404441379 34
4. update.exe 4b63963bcc580f48f5a40bda656ebd51 6
5. winsrvcn.exe f75a8c506ed70d465e15065146843385 4
6. server.exe 1bf5e02e439c6cf09c220d5710b46ad5 4
7. csrss.exe b6c30f087bb3cbc38c7abb3e2ca4eaf2 2
8. alvsvpd.exe 61e2355a9bc4d852c06571b51f084448 2
9. camfrog.exe c8b0f1482d5026134d4be7f3b906b21f 1
10. system32.exe e83b9b6a0f906ad6564afc890ea5c6bd 1
11. file[1].exe 9b1b8011f18ac6b95c87cc5c115514e7 0
12. ffx.exe 905d88c67659fe04a35ec2c0f86c4ed0 0
13. winsystem.exe 4920b9bcc50cac48ce4cb3f4ce4c527e 0
14. svchost.exe 624f45f8ef3f192e8eb09a529fe0e3fe 0
15. spoolsv.exe c665a55e56966c44171d9c8900fbb529 0
16. ccdrive32.exe 39f2c3805d88cf76c5d79c54c1e37349 0
17. rundll32.exe 8d08b75195561ed02caa6f0abb3b4fd8 0
18. msn.exe 2afb4ee104bc1d0be383845845a9b511 0
19. H2sfasH.exe 31eb4ff720d93075a2fcbb203c590ff2 0
20. msvmcls64.exe ae7fa2384864f34947ac24f45ca9e4bf 0
21. win23.exe f2e2909a1aa1ba25357768061979b621 0
22. file.exe d948009c57aa4ef2d0e1944b561c12ba 0
More files

Registry Details

Backdoor.Bifrose may create the following registry entry or registry entries:
Regexp file mask
%ALLUSERSPROFILE%\cachemgr.exe
%SystemDrive%\Setup\CacheMgr.exe
%TEMP%\XX--XX--XX.txt

Analysis Report

General information

Family Name: Backdoor.Bifrose
Signature status: No Signature

Known Samples

MD5: 8b6450f6d43a9e848f6d33b06b3411c3
SHA1: 1f677ad0abcfe8f0c4c694c7732c7f95a94d08f6
SHA256: 8150596BCBBE51058C6988D0278A1AB14DC14F02700639E771D420726A81BA9A
File Size: 3.17 MB, 3166208 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments Modified by an unpaid evaluation copy of Resource Tuner 2 (www.heaventools.com)
Company Name Hanbitsoft corp.
File Description Tantra Client
File Version 6, 9, 0, 6
Internal Name HTLaunch
Legal Copyright Copyright (c) - 2003 Hanbitsoft corp.
Original Filename HTLaunch.exe
Product Name Tantra Client
Product Version 1, 0, 0, 1

File Traits

  • 00 section
  • 2+ executable sections
  • HighEntropy
  • RT
  • x86

Block Information

Total Blocks: 4
Potentially Malicious Blocks: 0
Whitelisted Blocks: 3
Unknown Blocks: 1

Visual Map

0 0 0 ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • BadJoke.LMG

Windows API Usage

Category API
Other Suspicious
  • SetWindowsHookEx
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation

Related Posts

Trending

Most Viewed

Loading...