General
-
Target
2024-11-20_918db679c4099710db54a6d3f81aba6a_karagany_mafia_wapomi
-
Size
140KB
-
Sample
241120-p1n9fs1pen
-
MD5
918db679c4099710db54a6d3f81aba6a
-
SHA1
25c7cb38e330add1f395fd4d1d45a23f123f4898
-
SHA256
6a9f9a847e48e016562b6c7f1fba3f352ddec4713e4bbbcaa716a0f3683f8dd0
-
SHA512
b4c6f9255de8a517258a8e8b49b5798aad47c2f97ea356bbb5301a60f6f9e40a61a0cc8e822f1a159b6419030fe91ac541366c46237f9dda0b64889a7c4935e0
-
SSDEEP
3072:JtcbgiCNx3ezv6BirX1cDFA60LPkETEhFLB1a1ApmeRYE69eGCH:Abg3eugrl6p0bQW3
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_918db679c4099710db54a6d3f81aba6a_karagany_mafia_wapomi.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-20_918db679c4099710db54a6d3f81aba6a_karagany_mafia_wapomi
-
Size
140KB
-
MD5
918db679c4099710db54a6d3f81aba6a
-
SHA1
25c7cb38e330add1f395fd4d1d45a23f123f4898
-
SHA256
6a9f9a847e48e016562b6c7f1fba3f352ddec4713e4bbbcaa716a0f3683f8dd0
-
SHA512
b4c6f9255de8a517258a8e8b49b5798aad47c2f97ea356bbb5301a60f6f9e40a61a0cc8e822f1a159b6419030fe91ac541366c46237f9dda0b64889a7c4935e0
-
SSDEEP
3072:JtcbgiCNx3ezv6BirX1cDFA60LPkETEhFLB1a1ApmeRYE69eGCH:Abg3eugrl6p0bQW3
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-