General
-
Target
2024-11-14_ee8ade30845b976ed871906a0b1811da_karagany_mafia_wapomi
-
Size
120KB
-
Sample
241114-nsh7ssyemb
-
MD5
ee8ade30845b976ed871906a0b1811da
-
SHA1
063bc9d23bae1f98630740ad46645a9814ebe116
-
SHA256
45a7c1344bbc0ba3ff8069cba55924bfd963eaa46910b999cc661d48559f7d28
-
SHA512
8dba41e600bca290af62d2a1defb8084f44763cd5202989e3048273af8a7e44669256bd79eadba2f37e32be2053311ed9065db1d6906f19b8b7e85b93889b1da
-
SSDEEP
3072:FOzAt7oScwptXd1PS7U4j4XuKnwEmGCH:FP7ZtXTateu3Ev
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-14_ee8ade30845b976ed871906a0b1811da_karagany_mafia_wapomi.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-14_ee8ade30845b976ed871906a0b1811da_karagany_mafia_wapomi
-
Size
120KB
-
MD5
ee8ade30845b976ed871906a0b1811da
-
SHA1
063bc9d23bae1f98630740ad46645a9814ebe116
-
SHA256
45a7c1344bbc0ba3ff8069cba55924bfd963eaa46910b999cc661d48559f7d28
-
SHA512
8dba41e600bca290af62d2a1defb8084f44763cd5202989e3048273af8a7e44669256bd79eadba2f37e32be2053311ed9065db1d6906f19b8b7e85b93889b1da
-
SSDEEP
3072:FOzAt7oScwptXd1PS7U4j4XuKnwEmGCH:FP7ZtXTateu3Ev
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-