General
-
Target
2024-10-01_ec419c20b3ae26591509ab9c56882f5a_avoslocker_revil_wapomi
-
Size
2.2MB
-
Sample
241001-r166davbpn
-
MD5
ec419c20b3ae26591509ab9c56882f5a
-
SHA1
91ed1b064ccd3247e8a4232a6cf4818d40f8039c
-
SHA256
28c2c72660a2f5b7a4e4a40235d88d7c5df4b2a4660406672fd7f7514096db50
-
SHA512
1223e85e9d247f40838bb34fdba8ceccd353c93b565d48f41479630138af7bc6cb216f93c31ee1ce330327efd031991652e658a5b71438b207a9748759804e21
-
SSDEEP
49152:SFRuV9W8C7a6UYoWW4o+oCGCPZuDfkwJU+Qd8:SFR2RX6UCHoDrquD
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_ec419c20b3ae26591509ab9c56882f5a_avoslocker_revil_wapomi.exe
Resource
win7-20240729-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-10-01_ec419c20b3ae26591509ab9c56882f5a_avoslocker_revil_wapomi
-
Size
2.2MB
-
MD5
ec419c20b3ae26591509ab9c56882f5a
-
SHA1
91ed1b064ccd3247e8a4232a6cf4818d40f8039c
-
SHA256
28c2c72660a2f5b7a4e4a40235d88d7c5df4b2a4660406672fd7f7514096db50
-
SHA512
1223e85e9d247f40838bb34fdba8ceccd353c93b565d48f41479630138af7bc6cb216f93c31ee1ce330327efd031991652e658a5b71438b207a9748759804e21
-
SSDEEP
49152:SFRuV9W8C7a6UYoWW4o+oCGCPZuDfkwJU+Qd8:SFR2RX6UCHoDrquD
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-