General

  • Target

    2024-12-21_52c1ec73c1f44800cecf26379d3bf316_smoke-loader_wapomi

  • Size

    56KB

  • Sample

    241221-byckzsypet

  • MD5

    52c1ec73c1f44800cecf26379d3bf316

  • SHA1

    afccb91abbaf7c9b6c43ecd85ae6dd3cc392b186

  • SHA256

    94f46f8505e2be83e0c46f8ebd49fea1bbd0972c334fb68392c6c4a12f8a1c9a

  • SHA512

    fd4af3d249be4c0b567ba125519dffdab3123fe411628646bb77d6bd6203ec83940e759a1aebf5207d4f2e8306e62bd9710aa7681b3e27b103417ba324aa6255

  • SSDEEP

    1536:gXiEFKzTz7T+C4W97mwJIxdgqq9yGCq2iW7z:gi0Kz3+9RkIxxqQGCH

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2024-12-21_52c1ec73c1f44800cecf26379d3bf316_smoke-loader_wapomi

    • Size

      56KB

    • MD5

      52c1ec73c1f44800cecf26379d3bf316

    • SHA1

      afccb91abbaf7c9b6c43ecd85ae6dd3cc392b186

    • SHA256

      94f46f8505e2be83e0c46f8ebd49fea1bbd0972c334fb68392c6c4a12f8a1c9a

    • SHA512

      fd4af3d249be4c0b567ba125519dffdab3123fe411628646bb77d6bd6203ec83940e759a1aebf5207d4f2e8306e62bd9710aa7681b3e27b103417ba324aa6255

    • SSDEEP

      1536:gXiEFKzTz7T+C4W97mwJIxdgqq9yGCq2iW7z:gi0Kz3+9RkIxxqQGCH

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks