General
-
Target
20220621_zippedISOAttach.zip
-
Size
981KB
-
Sample
220621-v72q1sbbe7
-
MD5
dfe3a068c230b91e278188619889faa8
-
SHA1
2143479b2096f2e66f8eb007947b3168f4dabc3e
-
SHA256
c40e825d90e9da117b13b4116135abf326644feb417392cd3fe2adc6a7976e80
-
SHA512
250fde5ad976b699c0ab78ececbbe36e8f864a1577900a5171de699ccc189dbbff57f824fb8c9e571803c6be7ba41b6f2bfcb28afa5a2967ed5cca499d037451
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s3negar.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
s3negar.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
2006r
149.4.32.76:241
194.104.136.152:443
119.230.89.42:407
45.153.241.234:443
173.45.237.73:444
169.239.191.195:335
173.107.248.213:137
90.108.111.212:276
146.19.173.105:443
216.4.65.112:354
52.6.247.44:324
162.212.72.241:135
114.188.145.216:303
5.109.171.105:392
142.11.216.143:443
87.144.64.172:286
103.250.125.252:491
117.173.171.58:296
157.2.47.226:120
53.50.204.254:356
2.34.4.38:454
183.0.33.34:163
142.189.175.128:205
225.179.210.217:312
108.19.32.96:487
28.190.254.34:452
37.221.67.122:443
85.152.192.219:370
216.32.204.20:184
121.16.187.83:457
199.42.52.200:451
112.143.41.13:382
123.186.42.228:329
129.68.41.164:186
79.234.141.88:261
78.110.135.61:346
12.82.239.17:144
228.124.215.123:325
247.245.143.91:112
104.168.174.159:443
75.29.108.109:312
126.254.234.119:401
15.69.89.142:344
140.105.178.41:403
135.74.167.74:286
10.254.12.95:336
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
956d949aea33054cc315c13c2f31092c
-
SHA1
4c37e4e5e8a6d04cd593a66e5be5e289440a612f
-
SHA256
c23fff6940d9b97ac9dce943bef6e9066291981ffe0f2c1b3f4fbc345203a857
-
SHA512
56eb41c38d626445143620f6e3dcfec59b7c7b6532d57685cee0651e0887c2b092d9d5310afc3d630819d69e2e49ca66ede38034f26e1097a2bd6d873aec8271
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
s3negar.dll
-
Size
1.6MB
-
MD5
5ffb7b6b8fd8998a33f9c56a07e5c097
-
SHA1
2b00d9bd48d025fdbfea9f2957e964f15ffaa1f4
-
SHA256
983ff2cfee5f4d8489f04a955148148d5060c64a2673acb538a8fc2d29fe7c13
-
SHA512
ebbaf344d91189e64c8b60466f3fc795556ad645ebefdb4f71e294926507bfea4ee8db5e2ec65c9068660cdd24256411c0af8bea8cc1845dbb389b22b0f851c2
Score3/10 -