General
-
Target
2025-01-08_e41c199061af5660bb7870545ce35d6c_avoslocker_luca-stealer_wapomi
-
Size
14.4MB
-
Sample
250108-qwh3batrdn
-
MD5
e41c199061af5660bb7870545ce35d6c
-
SHA1
0bfd35ad8f9781d1cf89505ea18ef805682e7b31
-
SHA256
d99265c7ea57f236ea164ad8cffc5ba7581c1849b51bbd276ddbadbd698adb73
-
SHA512
42254b93bd65c23729bf2bfee805000dddde0818332e1b3fa164a0c030f888417d385a511d90108644811895da7f6a686994f40e52dcd5837f38eae7520676cd
-
SSDEEP
196608:vU3accmg6nko6duK/ZJsv6tWKFdu9Cke2J7:G56d/ZJsv6tWKFdu9C92J7
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-08_e41c199061af5660bb7870545ce35d6c_avoslocker_luca-stealer_wapomi.exe
Resource
win7-20241010-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2025-01-08_e41c199061af5660bb7870545ce35d6c_avoslocker_luca-stealer_wapomi
-
Size
14.4MB
-
MD5
e41c199061af5660bb7870545ce35d6c
-
SHA1
0bfd35ad8f9781d1cf89505ea18ef805682e7b31
-
SHA256
d99265c7ea57f236ea164ad8cffc5ba7581c1849b51bbd276ddbadbd698adb73
-
SHA512
42254b93bd65c23729bf2bfee805000dddde0818332e1b3fa164a0c030f888417d385a511d90108644811895da7f6a686994f40e52dcd5837f38eae7520676cd
-
SSDEEP
196608:vU3accmg6nko6duK/ZJsv6tWKFdu9Cke2J7:G56d/ZJsv6tWKFdu9C92J7
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-