General
-
Target
20220621_ReportExample.zip
-
Size
980KB
-
Sample
220621-xgn4cacff4
-
MD5
757253119f1fcd87b2c4b7d3bca9dc8f
-
SHA1
a48ffa0b1b0199a66dbf0d1b2e941378771ba6a8
-
SHA256
86fbeba0e3564f8dd1b37260fa0e1d5dcc30466ef17c02e41eb41c46f09762e0
-
SHA512
270fada6991c2b3b12a8ad68e3e5a78fd1b7f33eaed55c30eee6b610444dc7508ea44c75ce241f59b1d13987aee97674e3206b4b20b93cc5c82a67d299ef8af8
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
s3negar.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
s3negar.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
2006r
149.4.32.76:241
194.104.136.152:443
119.230.89.42:407
45.153.241.234:443
173.45.237.73:444
169.239.191.195:335
173.107.248.213:137
90.108.111.212:276
146.19.173.105:443
216.4.65.112:354
52.6.247.44:324
162.212.72.241:135
114.188.145.216:303
5.109.171.105:392
142.11.216.143:443
87.144.64.172:286
103.250.125.252:491
117.173.171.58:296
157.2.47.226:120
53.50.204.254:356
2.34.4.38:454
183.0.33.34:163
142.189.175.128:205
225.179.210.217:312
108.19.32.96:487
28.190.254.34:452
37.221.67.122:443
85.152.192.219:370
216.32.204.20:184
121.16.187.83:457
199.42.52.200:451
112.143.41.13:382
123.186.42.228:329
129.68.41.164:186
79.234.141.88:261
78.110.135.61:346
12.82.239.17:144
228.124.215.123:325
247.245.143.91:112
104.168.174.159:443
75.29.108.109:312
126.254.234.119:401
15.69.89.142:344
140.105.178.41:403
135.74.167.74:286
10.254.12.95:336
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
1d43bbd7301e12a5047c10f1938a4e41
-
SHA1
5088ef29327d60651678cadc8e00e3cca95c4dfb
-
SHA256
26f55122d1ab31238ceb46e816717c50dd2aad69a991ef79f5a4824bbe96b921
-
SHA512
826257ff28350eb645ed68f8fcf87a02d267b2594ee37963478807aeec391a5840977b80719882681eb29183206bc0d5936e92e31fdc4dfc0154b147edcc0570
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
s3negar.dll
-
Size
1.6MB
-
MD5
e96805cad0ee3a8fe51a1f15755d62cc
-
SHA1
c597e13cb44cebf5401ccb56e92ef64c18128e34
-
SHA256
262cb83dca4b482b1fb74e10c0eb5e668ba605081d5d42d559e80b864de8c3e3
-
SHA512
b1c45021f018ccf2a2e100aabb770bfc047388b991d3e4547651ee69ccdf66de6393e668e985b612f552fdc1ba137b636100f9259082c17682844456d149d3bf
Score3/10 -