General
-
Target
weTransfer_20220628.zip
-
Size
1009KB
-
Sample
220628-zjfwvscber
-
MD5
ea74a77d035c02d1eba2b8edf032e94c
-
SHA1
2476fd03768f9a9e6d977b614bde2ccd14156a71
-
SHA256
829da96f3749a0a174b525c353de071ee8bae67655608a61a8bf83f06d791af4
-
SHA512
607aba7d5f8fe8dd9ee2d3745ef73c96d6c9c0c4bc3f58255e211a50f9bff3519bd8aec4e188f09db98aaa6050bff0a731ca917aa89a445fcbf25bd510a96666
Static task
static1
Behavioral task
behavioral1
Sample
PRD.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PRD.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
sec.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
sec.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
sec.rsp
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
sec.rsp
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
286a
40.126.50.56:271
185.62.58.175:443
3.27.187.15:317
28.236.100.216:424
75.72.64.79:334
156.148.26.226:446
104.83.15.21:107
199.236.144.121:106
6.23.156.239:194
211.73.200.45:129
240.230.245.154:407
209.141.58.141:443
35.225.143.246:179
212.151.132.229:145
163.192.104.228:409
138.84.254.103:385
52.100.187.210:219
74.205.65.255:245
233.96.129.4:276
114.35.182.27:323
103.175.16.116:443
146.70.106.52:443
199.89.92.124:109
11.24.35.141:268
113.180.124.216:333
59.22.171.98:246
132.67.3.106:429
108.62.118.145:443
171.44.250.79:472
72.212.122.103:220
183.61.204.160:256
120.192.237.112:424
97.203.17.22:342
19.237.111.47:139
185.99.166.162:475
230.120.141.53:464
26.212.209.119:471
129.22.123.8:482
149.22.209.252:214
154.56.0.112:443
193.79.90.141:257
237.129.109.124:433
68.36.136.74:128
153.11.154.143:222
70.138.179.40:315
235.7.231.55:207
39.19.205.215:353
212.67.196.127:183
185.82.152.12:146
158.148.141.98:485
180.242.239.7:382
218.198.206.120:338
46.98.104.253:162
172.93.193.187:443
216.92.5.162:117
144.178.219.18:19
Targets
-
-
Target
PRD.lnk
-
Size
1KB
-
MD5
ba087f3dc565e4c1dc54c5e2f581f4a1
-
SHA1
90940bfa9973a4d455e25d09c2c0f1c4d2ffb06e
-
SHA256
dfc5072b4874706e6ebe8c47140dedc6051f8dda92351bdea8996154e6a96ed2
-
SHA512
c3f22c3d24d08b4fe96e097bbb192f1c47afc3933b49d20da98d33edd0fb8c6c7615a102a4f75d6f1ef50c0c85ab574e9b41be9adf780ee27b6667b3e64d648c
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
sec.dll
-
Size
1.7MB
-
MD5
a30bf883c38b54c3b22a2f8ccfb1bd8a
-
SHA1
9a5ec009753040c5214b864d9d271901eb4542ac
-
SHA256
95a6114c8b9879ebc9a0142fcd46d41dd428380a27d5b396a232f42e4a505fb2
-
SHA512
64d3f30c8564e4eedecd7f3f8c3b1eafaa3d781fb5bef39825ea1b8fdd1f39c38ac477f08a7a147fcb2f404c32ded7ae841b5bb443070945e1aa60668838ed58
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
sec.rsp
-
Size
14B
-
MD5
178205c1d8cc39f1e6a76bf86d791dc8
-
SHA1
215b7894b9680f604802b65381c58848ef3f17f5
-
SHA256
0f1419dcae5228bbe4f9305d5b265478ef5c618adc41540a637e08eb25f66429
-
SHA512
1dc4edb8c1467d5de639d9f5afaee1bec19edfab83f6d307cdbcb3870c22276029c92f06cb2bdefa1dab04c6f9009e5cc998cc009b68707ec92e59cd311eda78
Score3/10 -