General
-
Target
2024-11-14_9d64703f0c9d4968778bf4963538f5c2_karagany_mafia_wapomi
-
Size
140KB
-
Sample
241114-npnm4syfjm
-
MD5
9d64703f0c9d4968778bf4963538f5c2
-
SHA1
1155aa9ae7cf149743e7adc38b57179f18447cf0
-
SHA256
af03e4c499ee4a3714db18fcc348e7c1caa7e3a06834b44eee3bc16c1d3b2473
-
SHA512
723e200eee808b43abced07346e80f02f15876e08652fc1a5c3db67e34619140db2d6d974161a7f11378a381d1921a0fb9b6130b671ef4dcb95572d80d2dde8a
-
SSDEEP
3072:JtcbgiCNx3ezv6BirX1cDFA60LPkETEhFLB1a1ApmeRYE69EGCH:Abg3eugrl6p0bQWZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-14_9d64703f0c9d4968778bf4963538f5c2_karagany_mafia_wapomi.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-14_9d64703f0c9d4968778bf4963538f5c2_karagany_mafia_wapomi
-
Size
140KB
-
MD5
9d64703f0c9d4968778bf4963538f5c2
-
SHA1
1155aa9ae7cf149743e7adc38b57179f18447cf0
-
SHA256
af03e4c499ee4a3714db18fcc348e7c1caa7e3a06834b44eee3bc16c1d3b2473
-
SHA512
723e200eee808b43abced07346e80f02f15876e08652fc1a5c3db67e34619140db2d6d974161a7f11378a381d1921a0fb9b6130b671ef4dcb95572d80d2dde8a
-
SSDEEP
3072:JtcbgiCNx3ezv6BirX1cDFA60LPkETEhFLB1a1ApmeRYE69EGCH:Abg3eugrl6p0bQWZ
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-