General
-
Target
2024-12-21_e25dad8709bfd24b7b6d6d1f4fa08cad_smoke-loader_vidar_wapomi
-
Size
340KB
-
Sample
241221-b4hzyszlfl
-
MD5
e25dad8709bfd24b7b6d6d1f4fa08cad
-
SHA1
756ef7d1b46058a8f9a0ac970d70a6b99ad7f714
-
SHA256
f3a03b31eab9cfe7b1fb24cabcd6636a4e6a6d4305933673f79c0c3057d5e1c2
-
SHA512
5b4ad8516344a93a417675f02b15b9a809362253515ec97549b1e82b99c339957ebbfd122cbca92ff0164fb926c7549b490443e0ae37c56208f186f7a576f8f0
-
SSDEEP
6144:NJNZY5Qyj72EDV60+Al55WmYkIcMWgwwBehAt1qh:PP4n2yDBYkIYwBeA
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_e25dad8709bfd24b7b6d6d1f4fa08cad_smoke-loader_vidar_wapomi.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-12-21_e25dad8709bfd24b7b6d6d1f4fa08cad_smoke-loader_vidar_wapomi
-
Size
340KB
-
MD5
e25dad8709bfd24b7b6d6d1f4fa08cad
-
SHA1
756ef7d1b46058a8f9a0ac970d70a6b99ad7f714
-
SHA256
f3a03b31eab9cfe7b1fb24cabcd6636a4e6a6d4305933673f79c0c3057d5e1c2
-
SHA512
5b4ad8516344a93a417675f02b15b9a809362253515ec97549b1e82b99c339957ebbfd122cbca92ff0164fb926c7549b490443e0ae37c56208f186f7a576f8f0
-
SSDEEP
6144:NJNZY5Qyj72EDV60+Al55WmYkIcMWgwwBehAt1qh:PP4n2yDBYkIYwBeA
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-