General
-
Target
2024-12-21_3706e8ac94308538f51c7f0815a6c451_smoke-loader_wapomi
-
Size
249KB
-
Sample
241221-mtwzlsykhm
-
MD5
3706e8ac94308538f51c7f0815a6c451
-
SHA1
68fe35c467b9e16f1c40f5e813e4a21a83a3a5f3
-
SHA256
156e7146d9c2ca7ac03eafbe06b275ed2205029a23358154ef6659bab9a285df
-
SHA512
d62956be0bb55efdfabfafc3d17b87f49258a7d4442dcaa047390d92a1d429a494b0c20200f43dc3a1682b25cf55327e0bbaba0cf1717d0a300026c75c1e745b
-
SSDEEP
6144:v73iAB4bheAODmtrvaU9hdhiGzcwXbMf:v73iykheAOKhdh1z3o
Behavioral task
behavioral1
Sample
2024-12-21_3706e8ac94308538f51c7f0815a6c451_smoke-loader_wapomi.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-12-21_3706e8ac94308538f51c7f0815a6c451_smoke-loader_wapomi
-
Size
249KB
-
MD5
3706e8ac94308538f51c7f0815a6c451
-
SHA1
68fe35c467b9e16f1c40f5e813e4a21a83a3a5f3
-
SHA256
156e7146d9c2ca7ac03eafbe06b275ed2205029a23358154ef6659bab9a285df
-
SHA512
d62956be0bb55efdfabfafc3d17b87f49258a7d4442dcaa047390d92a1d429a494b0c20200f43dc3a1682b25cf55327e0bbaba0cf1717d0a300026c75c1e745b
-
SSDEEP
6144:v73iAB4bheAODmtrvaU9hdhiGzcwXbMf:v73iykheAOKhdh1z3o
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-