General
-
Target
2024-12-03_f5541837002848a4c08a66cd7dbeb898_avoslocker_cobalt-strike_luca-stealer_wapomi
-
Size
606KB
-
Sample
241203-ydq9zawldq
-
MD5
f5541837002848a4c08a66cd7dbeb898
-
SHA1
c660dd770588c522ad04090a78176ab04ddc77fb
-
SHA256
23c12789f78e83e6868a1289248c001f80a066dfc7c3c3ed05fb688c5e01d0bf
-
SHA512
5a28956ff6bcae260292bd6f04a7c990c594a54f432014b700190d7c1ed89a4d65e9a9f1f2f36967767dd5e2b738657b826714360f173641d3cb7c338fb61b8f
-
SSDEEP
12288:KubXcwafJcLln5QwnVWqqPIBONhxsU/E:KurP90r/xsU/E
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-03_f5541837002848a4c08a66cd7dbeb898_avoslocker_cobalt-strike_luca-stealer_wapomi.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-12-03_f5541837002848a4c08a66cd7dbeb898_avoslocker_cobalt-strike_luca-stealer_wapomi
-
Size
606KB
-
MD5
f5541837002848a4c08a66cd7dbeb898
-
SHA1
c660dd770588c522ad04090a78176ab04ddc77fb
-
SHA256
23c12789f78e83e6868a1289248c001f80a066dfc7c3c3ed05fb688c5e01d0bf
-
SHA512
5a28956ff6bcae260292bd6f04a7c990c594a54f432014b700190d7c1ed89a4d65e9a9f1f2f36967767dd5e2b738657b826714360f173641d3cb7c338fb61b8f
-
SSDEEP
12288:KubXcwafJcLln5QwnVWqqPIBONhxsU/E:KurP90r/xsU/E
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-