General

  • Target

    2025-02-27_56cdb05fa5a6baa5a787cbf460a46a54_smoke-loader_wapomi

  • Size

    496KB

  • Sample

    250227-czleys1xav

  • MD5

    56cdb05fa5a6baa5a787cbf460a46a54

  • SHA1

    4c18a270de95aea4ffd58370a375ce15e0ae7c9a

  • SHA256

    c9d662ad82796b60e71f4cb3c1da76badbc00b3c11ab0d4fac14a6ea9c92e0f7

  • SHA512

    73c538b75fd3a29b9fa89523f8e9974337e72623dd0962e485d198f603e224019ada23d6ad8c3051a3a57e760cec2170293feffa331fbc7dea5accf6a1fd8f53

  • SSDEEP

    6144:bDlS4jMD+gSR+P8mVJbGgB1TpYjyUhUbPI3iBbZiSt/pnyq61keTcnzFdHXtwsi2:FAa+RQjyfTYiBk4QWe0zTXUvflZJ20y

Malware Config

Extracted

Family

emotet

Botnet

Epoch3

C2

116.203.117.76:80

108.166.188.146:7080

216.154.222.52:7080

203.99.182.135:443

212.112.113.235:80

139.59.242.76:8080

110.36.234.146:80

113.52.135.33:7080

108.179.216.46:8080

186.10.16.244:53

200.114.134.8:20

41.60.202.26:22

125.99.61.162:7080

176.58.93.123:80

5.189.148.98:8080

201.196.15.79:990

45.33.1.161:8080

46.32.229.152:8080

94.177.253.126:80

78.189.94.99:8443

rsa_pubkey.plain

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Targets

    • Target

      2025-02-27_56cdb05fa5a6baa5a787cbf460a46a54_smoke-loader_wapomi

    • Size

      496KB

    • MD5

      56cdb05fa5a6baa5a787cbf460a46a54

    • SHA1

      4c18a270de95aea4ffd58370a375ce15e0ae7c9a

    • SHA256

      c9d662ad82796b60e71f4cb3c1da76badbc00b3c11ab0d4fac14a6ea9c92e0f7

    • SHA512

      73c538b75fd3a29b9fa89523f8e9974337e72623dd0962e485d198f603e224019ada23d6ad8c3051a3a57e760cec2170293feffa331fbc7dea5accf6a1fd8f53

    • SSDEEP

      6144:bDlS4jMD+gSR+P8mVJbGgB1TpYjyUhUbPI3iBbZiSt/pnyq61keTcnzFdHXtwsi2:FAa+RQjyfTYiBk4QWe0zTXUvflZJ20y

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Bdaejec family

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks