General
-
Target
2024-12-21_a46a710e3a985505d0a2762231327050_smoke-loader_wapomi
-
Size
60KB
-
Sample
241221-mw51asyje1
-
MD5
a46a710e3a985505d0a2762231327050
-
SHA1
c2ce23a7a0a27ddbf63267bcc9dbbfaefa797095
-
SHA256
4fd115d465fb0dc9d42d0eca8174333abaa219d3b763e82c9c09f74ff4873251
-
SHA512
b3151dc6ea2ce313c29d3c3300483e78a604135733b3cd5b214dfe83bb9883c3d842f91d0c3e4df1b6cc4294f76bc8f6ecea373bd643aff1d1a486dd3d81bfb4
-
SSDEEP
1536:rGzyZAvhHTuvQsMtWCSFmFnbtAO3d8sGCq2iW7z:6zxpWM8B+btAO3rGCH
Behavioral task
behavioral1
Sample
2024-12-21_a46a710e3a985505d0a2762231327050_smoke-loader_wapomi.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-12-21_a46a710e3a985505d0a2762231327050_smoke-loader_wapomi
-
Size
60KB
-
MD5
a46a710e3a985505d0a2762231327050
-
SHA1
c2ce23a7a0a27ddbf63267bcc9dbbfaefa797095
-
SHA256
4fd115d465fb0dc9d42d0eca8174333abaa219d3b763e82c9c09f74ff4873251
-
SHA512
b3151dc6ea2ce313c29d3c3300483e78a604135733b3cd5b214dfe83bb9883c3d842f91d0c3e4df1b6cc4294f76bc8f6ecea373bd643aff1d1a486dd3d81bfb4
-
SSDEEP
1536:rGzyZAvhHTuvQsMtWCSFmFnbtAO3d8sGCq2iW7z:6zxpWM8B+btAO3rGCH
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-