General
-
Target
2024-12-04_7a33ef8d6f507337d473ab45ee9d8164_avoslocker_luca-stealer_wapomi
-
Size
3.5MB
-
Sample
241204-x64kbsxld1
-
MD5
7a33ef8d6f507337d473ab45ee9d8164
-
SHA1
c090882d93c1e260ea8151e90ecceb96290af8a4
-
SHA256
e3112e1558f2fd0251ce474b4ab1e29775e8fbc572ddf8cac777ebc4bba7b4b8
-
SHA512
24c79cc981c0eef78ab5ce1187b56087dbdce5b3fb7be6e760e0e143605a0211423d39c42ff12b3b94985fd413c72a40982f0adf9d7a62e095b1fd5327618345
-
SSDEEP
98304:TTVmfVf9VudfKQjZXMm8qGuxCfac6xAKyfTim/FLOAkGkzdnEVomFHKnPW:TyVudbqfac6xAKy7rFLOyomFHKnPW
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-04_7a33ef8d6f507337d473ab45ee9d8164_avoslocker_luca-stealer_wapomi.exe
Resource
win7-20240708-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-12-04_7a33ef8d6f507337d473ab45ee9d8164_avoslocker_luca-stealer_wapomi
-
Size
3.5MB
-
MD5
7a33ef8d6f507337d473ab45ee9d8164
-
SHA1
c090882d93c1e260ea8151e90ecceb96290af8a4
-
SHA256
e3112e1558f2fd0251ce474b4ab1e29775e8fbc572ddf8cac777ebc4bba7b4b8
-
SHA512
24c79cc981c0eef78ab5ce1187b56087dbdce5b3fb7be6e760e0e143605a0211423d39c42ff12b3b94985fd413c72a40982f0adf9d7a62e095b1fd5327618345
-
SSDEEP
98304:TTVmfVf9VudfKQjZXMm8qGuxCfac6xAKyfTim/FLOAkGkzdnEVomFHKnPW:TyVudbqfac6xAKy7rFLOyomFHKnPW
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-