General
-
Target
2025-02-27_ec643f235368690114c4133a77689f0a_smoke-loader_wapomi
-
Size
210KB
-
Sample
250227-c6a8kaspw4
-
MD5
ec643f235368690114c4133a77689f0a
-
SHA1
e0677ceb0095e89520f82371eceee090a37c41d1
-
SHA256
bec4376ec5e5e76bf7a11170951dba67c39b665629cd47d1c7fdf33a24f2f7b0
-
SHA512
707ac1b126586cd8261d0e3fc81d33bfb43d9e0dfdb188fdea45d2c58cb9919f316e23645f755512b8ab25ecc1fdd41e48e4552986f481124232f2b48699ed3e
-
SSDEEP
3072:NR3YT8Nafa2MnXXE1CVgewi8DrH2JR1jyBNMy5BIVOCwHhlPGCH:7pa/MXU1CgoErWVjmjWJaho
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-27_ec643f235368690114c4133a77689f0a_smoke-loader_wapomi.exe
Resource
win7-20240903-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Extracted
netwire
uploadp2p.publicvm.com:4000
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
Corona-%Rand%
-
install_path
%AppData%\Install\hostvs.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
wBEKeAsQ
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
2025-02-27_ec643f235368690114c4133a77689f0a_smoke-loader_wapomi
-
Size
210KB
-
MD5
ec643f235368690114c4133a77689f0a
-
SHA1
e0677ceb0095e89520f82371eceee090a37c41d1
-
SHA256
bec4376ec5e5e76bf7a11170951dba67c39b665629cd47d1c7fdf33a24f2f7b0
-
SHA512
707ac1b126586cd8261d0e3fc81d33bfb43d9e0dfdb188fdea45d2c58cb9919f316e23645f755512b8ab25ecc1fdd41e48e4552986f481124232f2b48699ed3e
-
SSDEEP
3072:NR3YT8Nafa2MnXXE1CVgewi8DrH2JR1jyBNMy5BIVOCwHhlPGCH:7pa/MXU1CgoErWVjmjWJaho
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
NetWire RAT payload
-
Netwire family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-