General
-
Target
oFWkRTFwjm.zip
-
Size
1.9MB
-
Sample
220603-1brttsdha7
-
MD5
972038d369ec6f134fc9b6c617adc328
-
SHA1
0b74896a84f8e22645d8518135836ea22ae98cde
-
SHA256
d184c7fac35e68924cf520d33fabc0703198756e096592dd31eec6101b5551e5
-
SHA512
6ffeefd8c13785500a546e114cd766c8a2b804723511e2bb5ebeca1c5bfe44349b8c91695ac97bcf2da2d77c01530247f771655b132c649fdd9e00e710b4d8af
Static task
static1
Behavioral task
behavioral1
Sample
oFWkRTFwjm.zip
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
oFWkRTFwjm.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
document.iso
Resource
win10-20220414-en
Behavioral task
behavioral4
Sample
document.iso
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
documents.lnk
Resource
win10-20220414-en
Behavioral task
behavioral6
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
lipes.dll
Resource
win10-20220414-en
Behavioral task
behavioral8
Sample
lipes.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
106r
144.19.20.11:443
150.27.81.2:443
46.21.153.145:443
109.45.29.202:443
6.30.139.246:443
236.110.58.103:443
36.110.58.103:443
149.255.35.134:443
9.63.15.101:443
45.147.229.50:443
184.23.74.168:443
139.24.56.111:443
243.45.135.100:443
21.246.85.34:443
79.44.167.23:443
30.17.4.146:443
56.134.87.45:443
16.46.4.333:443
224.145.6.33:443
Targets
-
-
Target
oFWkRTFwjm.zip
-
Size
1.9MB
-
MD5
972038d369ec6f134fc9b6c617adc328
-
SHA1
0b74896a84f8e22645d8518135836ea22ae98cde
-
SHA256
d184c7fac35e68924cf520d33fabc0703198756e096592dd31eec6101b5551e5
-
SHA512
6ffeefd8c13785500a546e114cd766c8a2b804723511e2bb5ebeca1c5bfe44349b8c91695ac97bcf2da2d77c01530247f771655b132c649fdd9e00e710b4d8af
Score4/10 -
-
-
Target
document.iso
-
Size
2.9MB
-
MD5
f85b9913ed3c1b37defe3a83c9107ae9
-
SHA1
bd8732ac09eb363102cf8e3060869e7799c6afb5
-
SHA256
6daa6a247d6989fe4723a1d0868ed4abb6dfaadf09d1177fa23856b841e00644
-
SHA512
eed53b0bfc761259edb05ebcbb53c8e603ccdba33888a550671d60a9c2747f543b0d5c0a9d8cbc30bea7d20b872b72be1c621a5f58a18dae9dfe4eb27a79522a
Score3/10 -
-
-
Target
documents.lnk
-
Size
1KB
-
MD5
dcfc03467dc198612184a307837073d0
-
SHA1
1fc2d8047e27d14e91c1061a07cc77fd8404747b
-
SHA256
23e0f3debe5e378bd4ca50ee5243ec67f979ab66507b8ca97310c94706901c4a
-
SHA512
97ba6aab3917be2da603cc7c9fd629dea478c13b7947400d2bf9bba6676e41b04b5588dc61ee9d39a2121d427bf2a602117fbec0d7071109be69333afbea1afa
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
lipes.dll
-
Size
1.5MB
-
MD5
9ef37bfa9f7e30500ad9edf136ee59d1
-
SHA1
7b31d4ec43c65666f2e08bb73ec7877cf74d34a0
-
SHA256
a1040e1d6b43eda731179d139f76949afb962b8cb28c55f4097cf5a5c6c445c1
-
SHA512
1a52c2bb2775476a14220f79483582b5b09a310fcc5b017df8482ad3e5a0fb6438e28ae23da4cc76e6f05972ccec0d077065dcbd8d8d219d5897250ce38393bd
Score1/10 -