General

  • Target

    90ef9d1cd49e1e7d3244db587e208d14c89d209fda9df1ee9123bdf1225ffd8c.iso

  • Size

    2.9MB

  • Sample

    220617-ft5hesdae8

  • MD5

    17eabf73c5ab8530e426596f14a500e5

  • SHA1

    d135c0e39deafa18b0b9654cb5e879e1333e4052

  • SHA256

    90ef9d1cd49e1e7d3244db587e208d14c89d209fda9df1ee9123bdf1225ffd8c

  • SHA512

    e22f4e45ace405fa091ac2abb99369fd5522d715be3d82739df3aec7b91c28f5cda63307057b1a46be724dfedf56d5ca0c4ae84f9310fff29c8392e98279598c

Malware Config

Extracted

Family

bumblebee

Botnet

156r

C2

249.241.29.24:181

124.243.81.221:274

142.11.216.143:443

190.123.237.229:261

208.84.180.22:146

103.175.16.106:443

18.8.71.243:176

37.64.220.2:332

100.93.33.185:487

182.62.4.186:282

239.100.121.57:329

228.78.147.191:253

212.234.34.219:148

138.65.77.29:391

55.14.133.44:292

221.238.146.116:272

91.167.137.83:421

66.23.70.38:168

183.37.64.159:220

241.112.226.151:197

rc4.plain

Targets

    • Target

      90ef9d1cd49e1e7d3244db587e208d14c89d209fda9df1ee9123bdf1225ffd8c.iso

    • Size

      2.9MB

    • MD5

      17eabf73c5ab8530e426596f14a500e5

    • SHA1

      d135c0e39deafa18b0b9654cb5e879e1333e4052

    • SHA256

      90ef9d1cd49e1e7d3244db587e208d14c89d209fda9df1ee9123bdf1225ffd8c

    • SHA512

      e22f4e45ace405fa091ac2abb99369fd5522d715be3d82739df3aec7b91c28f5cda63307057b1a46be724dfedf56d5ca0c4ae84f9310fff29c8392e98279598c

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Registers COM server for autorun

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks