General
-
Target
file.zip
-
Size
892KB
-
Sample
220627-y6jqladbgm
-
MD5
a4f2e4e4398d884e46fa2d6c54998c19
-
SHA1
d0845f2b1dbee849dd52bba2a06fc6a22bbdf027
-
SHA256
8427fe989bc9b71a07d2a26a80e9f88fb2f2a7cb068fff5a7998e6a4628432bc
-
SHA512
df684cb7008e3117ee6b5c64ab3ff89879359c45ff9b0d1aff1a5862c6c142e71d2fdc00e4ed53d57bce2a8f575fffaff413a1d293ff952e8facae0ee382bac2
Static task
static1
Behavioral task
behavioral1
Sample
loader.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
loader.bat
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
n3zarek.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
n3zarek.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
276r
76.81.225.65:337
41.28.188.77:212
51.199.209.83:290
192.119.77.100:443
68.121.248.35:464
54.37.131.14:443
149.197.87.217:409
224.110.0.53:105
253.13.70.127:340
122.50.173.112:157
103.25.51.23:388
199.61.79.119:346
68.14.88.177:143
227.12.148.222:270
33.93.97.183:112
168.113.169.88:428
64.157.160.42:207
156.151.142.100:123
146.19.253.56:443
135.36.57.27:157
124.79.186.17:245
254.230.180.37:486
179.4.178.202:339
14.155.143.74:191
31.228.253.114:427
218.122.217.28:234
212.107.138.109:287
29.122.243.158:226
175.90.216.232:197
12.75.186.131:263
227.233.79.54:327
156.165.161.82:298
150.37.37.18:112
145.250.252.150:418
234.248.206.141:176
141.69.161.34:281
24.4.68.32:418
10.28.17.62:401
194.120.202.95:468
245.245.176.160:137
78.24.136.181:493
28.107.38.196:269
151.233.218.244:192
21.21.141.32:133
159.117.143.69:265
154.171.215.86:169
78.74.20.180:433
135.79.221.116:303
194.129.76.203:490
19.32.56.182:487
241.0.19.171:313
35.120.155.220:262
155.180.101.133:318
Targets
-
-
Target
loader.bat
-
Size
55B
-
MD5
7570714d0f7f867da3c26839c45842fd
-
SHA1
4d72ffc8ad5aa71c100f732da6eebd5d6e237414
-
SHA256
b3cb8e9bd42228a54aebd27f2f1435cb2643f698ab805aac64b691f0c0cdf5a6
-
SHA512
24396fa0e43cd8d5efa1c555905aae9ef1d7041d5aaf00e255d71ebbfc7dcaa72172c455148a2cefecfc52c1978ef782ce011473f4d837ae7a30f2c95880a613
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
n3zarek.dll
-
Size
1.4MB
-
MD5
08c3517c5ede72888fbc6f3763ba3066
-
SHA1
b9cf2513cd5606927032253a06592412ce8a801e
-
SHA256
690877449ad40cac88e0262df350ab3aa9c33fb788a6d8462003530af61e7ec5
-
SHA512
7c913d5224aa3ddc798941795f7b53612be8b776190bec0f6bde6c4f9db34c0c5d5a0cf662e0f216150bd8810dd01ac57c0125019f4185499181e07802d16e90
Score3/10 -