Backdoor.Bladabindi.H
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 5,395 |
| Threat Level: | 60 % (Medium) |
| Infected Computers: | 228 |
| First Seen: | July 27, 2021 |
| Last Seen: | January 24, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Backdoor.Bladabindi.H |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
e1ea66f070ace66160f31663446ffd3d
SHA1:
3ba7e0b46f6b45b815a67159ebf54ca12a16f559
SHA256:
17CFF13B69BDF9F0BC36E634569BC656D92FCEE384BA338F465DA629258DA60C
File Size:
1.74 MB, 1737216 bytes
|
|
MD5:
cf5186b7d71a318cc137a4e7be1534ef
SHA1:
a6db43b49b93f329b82f96dbe7e226c519e4cda6
SHA256:
977A414FDDD011D612AE85A217F83D23A244C18A6F6771E857A9C7D958E533F7
File Size:
76.80 KB, 76800 bytes
|
|
MD5:
b9daafad19a837bdb5133c0f39610df3
SHA1:
0a9c17b368582bf3534e979fd50d0d1d01c8b91f
SHA256:
F7D59F0FC0D7EC53BFA0D649B32229E8090FF17FCCE7647C0CDB9FC50FAC2653
File Size:
1.06 MB, 1058486 bytes
|
|
MD5:
a7060bcf3a73d614bf8628690dcf5aa5
SHA1:
000bc54e488e8beeb2067a76cb516f05bad4549b
SHA256:
29F32F03D7ADF43CAC2861975E6BED67FAEC783386836E1CEBA8A2A6E83015F8
File Size:
1.06 MB, 1058606 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is .NET application
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 1.0.0.0 |
| Comments | Launcher for Aquila |
| Company Name | Geneth, Aquila Online Staff |
| File Description |
|
| File Version |
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- .NET
- HighEntropy
- NewLateBinding
- RijndaelManaged
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- MSIL.Gamehack.BO
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| User Data Access |
|
| Anti Debug |
|
| Encryption Used |
|
| Other Suspicious |
|