General
-
Target
ta578_20220614_documentISO.zip
-
Size
929KB
-
Sample
220614-zzb8lshcc6
-
MD5
97e22d99210b2103dc1e61fe513dcad9
-
SHA1
d56f11bfe59bb8592604418b50a80b8d26d18840
-
SHA256
00aecfcff910d6e767aa8990f929a5c7cb0d78c1226302ba496cbd4d98147266
-
SHA512
62d2a2ffdf0fc4922658482e54c03c6312992d48ec1ff1f948720300f0d91022cf7a3a07513732dc00f3a1db4f57dc70762acc959421c3abeea83dfe2db86132
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
toso3l.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
toso3l.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
1406r
39.57.152.217:440
69.161.201.181:382
244.6.154.71:111
193.233.203.156:443
221.106.84.123:307
194.135.33.148:443
111.99.39.11:387
223.243.46.133:147
48.165.175.199:316
78.89.31.86:229
157.17.142.85:406
90.81.8.16:370
21.29.238.98:209
154.56.0.252:443
103.175.16.108:443
188.57.4.52:357
15.209.19.148:466
160.70.24.228:486
33.145.184.132:240
235.126.132.170:106
171.78.101.85:258
188.6.218.149:317
123.67.113.210:483
115.109.212.139:461
167.28.27.185:467
185.62.58.133:443
133.57.116.243:424
47.58.200.234:159
142.182.181.207:450
57.240.143.90:256
158.35.83.74:332
135.253.243.175:300
34.229.154.31:235
104.168.219.94:443
48.209.106.172:357
68.227.158.172:411
80.9.246.19:338
45.153.241.187:443
145.239.135.155:443
188.104.94.69:348
246.20.199.100:175
80.26.101.48:372
22.83.186.45:201
146.70.125.82:443
216.254.58.191:443
80.156.1.202:305
107.44.53.47:330
67.136.243.43:323
172.244.110.160:367
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
fd76759f202a3f3651d445f022a8f308
-
SHA1
47daf80efb7af421f01f7af22ed367f52695645d
-
SHA256
7ea93d3194137b5e8e11609733b6d1dbefda22cc1e129e25a06e8623f2bbc3e3
-
SHA512
f56b94e835d02d2fdb20f35022599584de23631cb7b5eeab52b68522404d5e7f82c9a8964d866b920314c0546ddaf4bd563a3b48e9cd5596e0777c656f75f3c2
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
toso3l.dll
-
Size
1.7MB
-
MD5
bf7b0dc1ad9a446d29f68c56c36bfac0
-
SHA1
6ffb70424b7cefd48c225406782e6f696a6890df
-
SHA256
209f9adfa52fc4c4e143d793441c91f101214e7eca2b49be32b5fa8995f5cfec
-
SHA512
f50b9b765df015c79693bcce9b07d2550e3597e005b2c26c0529ce2115b0bc11cdeeea5017822f6649ad183001d6097c1ff1f64c0187cdc3d542889532a8d8de
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-