What Elastic describes there is a classic case of AV‑masquerading: a loader drops an EXE that
looks like part of a trusted security product (here, Bitdefender’s
BDReinit.exe), but the digital signature does not validate.
A few practical takeaways from this
- File name and “Properties” are not enough
Malware authors can copy:
- File name (BDReinit.exe)
- Product name (“BitDefender Security”)
- Copyright strings, version info, etc.
Windows will happily display whatever they put into the PE resources. The onlything that really matters is:
- The Digital Signatures tab – is there a valid signature from Bitdefender?
- The file path – is it actually in Bitdefender’s install directory, or somewhere odd (user profile, temp, random folder)?
- “Invalid digital signature” = immediate red flag
If a binary claims to be from Bitdefender/Trend Micro but:
- The signature tab is missing, or
- The signature is present but reported as invalid,
then you should treat it as suspicious and not trust it just because the Description or Product Name says “Bitdefender Security”.
- Vendors not detecting (yet) is unfortunately normal
Elastic often publishes very fresh campaigns. It’s not unusual that:
- Static signatures are lagging behind for a while.
- Detection might exist only in advanced/EDR rules, not in the consumer product yet.
So your observation that Bitdefender and Trend Micro don’t currently flag those WMLOADER samples is believable. Signatures and heuristics will typically be updated once vendors triage the samples.
- If you encounter such a file yourself
- Upload the sample or at least the hash to VirusTotal / Hybrid Analysis to see multi‑engine opinions and behavior.
- Submit it directly to Bitdefender / Trend Micro as a suspicious file (they both have sample submission portals).
- Do not execute it further; if it already ran, run a full system scan with multiple reputable tools (on‑demand scanners) and consider posting logs in the Malware Removal section for a deeper look.
Hardening ideas against this kind of loader
- Use an AV/EDR with strong behavior blocking, not just signatures.
- On Windows Pro/Enterprise, enable Attack Surface Reduction rules and block suspicious child processes of Office, browsers, script interpreters, etc.
- Be cautious with “installers” or “fix tools” that claim to be from AV vendors but come from third‑party sites, forums, e‑mail, cracked software etc.
If you’re looking at a specific
BDReinit.exe on your system and are unsure whether it’s legitimate, you can post:
- Its full path
- A screenshot of the Digital Signatures tab
- The SHA‑256 hash (from e.g. HashCheck or PowerShell)
and other members can help you judge whether it matches the real Bitdefender component or looks like the WMLOADER impersonation.