General

  • Target

    2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi

  • Size

    94KB

  • Sample

    250227-c7rlyasp13

  • MD5

    f7ecddf6c68fa682bec8a847421c519b

  • SHA1

    0f5bd33ae134db2ac9efb4b36ff84850cb22d013

  • SHA256

    caefd53d1368a9e80e4cb0b15b4f803b8bea5a722c3001bf3778cc9dff7906b8

  • SHA512

    a34323ede0d921314c5c8699f95d2b1212d6d94215ec141a4ae7e1a39d0fe430b9323f79682c5d4bc5d66097e8b43aa9ba8d3459c9a3fab8c88c52ac8b5e0eac

  • SSDEEP

    1536:3HSpeffJzpa4PKvvMupbRzh7mI565HrVTblQfqAYUGCq2iW7z:3HSpefhpa4PKHffw9hTSf1GCH

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi

    • Size

      94KB

    • MD5

      f7ecddf6c68fa682bec8a847421c519b

    • SHA1

      0f5bd33ae134db2ac9efb4b36ff84850cb22d013

    • SHA256

      caefd53d1368a9e80e4cb0b15b4f803b8bea5a722c3001bf3778cc9dff7906b8

    • SHA512

      a34323ede0d921314c5c8699f95d2b1212d6d94215ec141a4ae7e1a39d0fe430b9323f79682c5d4bc5d66097e8b43aa9ba8d3459c9a3fab8c88c52ac8b5e0eac

    • SSDEEP

      1536:3HSpeffJzpa4PKvvMupbRzh7mI565HrVTblQfqAYUGCq2iW7z:3HSpefhpa4PKHffw9hTSf1GCH

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks