General
-
Target
TA579_20220614.zip
-
Size
1019KB
-
Sample
220615-qym42shban
-
MD5
48a6cee41fe68c8dba38467f8570f7ff
-
SHA1
a0f4412d626a0ec642a29ec8fc1427be47295118
-
SHA256
421864ad5225415972168f2ca1b0e5b877b17449e25342ffce00b507d37633bb
-
SHA512
7b9b6987166f5a110fbd4fac50f343a2e49e1743ea74897fffe861ed70b3095ad91dbbee1953a43b9d5f64601a854426a2b315b960b191d21ccdde0eb079ca6e
Static task
static1
Behavioral task
behavioral1
Sample
ScannedDocuments-0622.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ScannedDocuments-0622.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
inf.bat
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
inf.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
information.dll
Resource
win7-20220414-en
Malware Config
Extracted
bumblebee
146l
242.165.212.79:339
162.144.249.150:239
63.122.120.151:268
144.52.138.51:193
18.215.29.142:436
115.239.67.202:380
255.11.235.99:426
213.203.201.199:307
143.117.20.123:425
141.98.168.70:443
174.150.214.40:426
133.133.249.24:204
126.68.7.249:422
103.175.16.107:443
146.70.124.77:443
154.56.0.100:443
180.184.129.160:223
28.78.74.145:427
108.28.254.44:399
115.103.22.1:153
149.57.112.159:122
229.139.73.188:287
112.110.146.153:349
249.222.51.70:286
180.23.251.29:230
244.234.60.83:386
79.133.212.60:211
192.21.12.118:231
31.215.170.180:431
140.208.107.161:360
119.177.224.146:124
58.10.55.201:382
57.156.134.113:446
83.142.26.147:465
194.135.33.16:443
35.17.203.69:268
104.135.8.250:417
210.251.188.194:228
53.96.32.99:333
70.77.209.88:224
65.254.82.66:498
65.95.20.151:232
165.158.204.41:469
185.62.58.209:443
102.109.16.255:445
137.253.55.69:235
Targets
-
-
Target
ScannedDocuments-0622.lnk
-
Size
1KB
-
MD5
3241e36fc0c204fd96ef9302a3b11969
-
SHA1
9add539d4a7982cc426e6852f7223d5ace95549c
-
SHA256
4c536168dab929de00efea26af786da1282aa2aa2b6809d89eb62ad76404b564
-
SHA512
0c70f5cd7f64cacc3516162d2ce2832b83e7143a868d1c45eb2b09d1e8150cb125ecda6843f613546e5e27e828ae02bde8d8166da9d8a92934e343a9b493eb5d
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
inf.bat
-
Size
41B
-
MD5
993ea3729ef89775410c1f8a5e4a468f
-
SHA1
3f5b69eb4d54ee92493f211e13ffb89cda914650
-
SHA256
1e78385d81b5177c733c7e2ed2f91d5400fd526c786cac089aef6e6f6ec2f08e
-
SHA512
14564f14807a341b161a753da27af790275e2dd0803c37c294c52d8882962ab0f774775417a80beacef4fb07cc36cc683077622d5851b5733005791a5d3abdff
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
information.dll
-
Size
2.0MB
-
MD5
c9216484a6371b055705ec5f4098ab01
-
SHA1
a13903e50408e11996159fba5f7deab1e73e8f08
-
SHA256
fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2
-
SHA512
64485bb8e1845a29f9d60343a0bd6fd8de4220aa83f3cd19eed47737642b79db2753106192798d495202e74016f2e845d161c1362ad09b01104f9cfb8c939359
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-