General
-
Target
2c08a491b19efc57e53fbfb8f393eb40d786ea5832bed28148bd12e9ffc51f9c.rar
-
Size
912KB
-
Sample
220701-bx32jsedgp
-
MD5
d451ef85c3c17a8513e0583992d47f5a
-
SHA1
86e57089e3d7afc986fbd177c7a4356c69558a88
-
SHA256
2c5f32ed4fc225f2783892b3999e0f543451be596fa3c6d2716235177dfa6558
-
SHA512
5d16e0bf7fd6685994cf085fea89e2ebc9568ea1b531ae611c80f857ff779d49e836ac5f0c5d94fa74e35a642bbfe4b53880d5679862abe0369388ad1a0e40a8
Static task
static1
Behavioral task
behavioral1
Sample
PRD.lnk
Resource
win7-20220414-en
Malware Config
Extracted
bumblebee
306f
76.148.239.59:345
164.137.75.183:397
196.230.60.243:288
28.200.131.233:351
156.139.67.244:461
209.141.46.50:443
146.19.173.155:443
60.18.14.24:308
156.26.157.68:310
206.63.122.98:179
255.23.50.218:274
124.177.4.180:404
82.209.238.26:336
122.142.229.194:311
27.183.95.15:443
126.52.147.11:276
104.35.182.83:440
14.58.138.89:277
21.184.24.214:475
214.61.246.124:182
55.239.194.22:458
11.142.8.123:297
157.11.10.77:129
140.79.136.23:147
47.209.156.101:417
131.102.103.204:138
4.29.179.92:265
49.123.106.15:399
54.38.138.94:443
129.165.47.226:302
236.253.143.84:232
92.186.104.219:154
219.84.155.4:378
198.97.148.29:361
10.73.149.20:375
43.102.237.35:136
53.194.157.74:460
77.231.147.46:368
124.117.76.239:105
250.46.229.65:450
215.28.61.251:399
33.168.63.212:478
95.127.117.7:193
101.221.31.35:313
62.74.188.164:351
72.248.78.18:220
213.14.174.95:294
220.82.79.187:330
41.245.112.154:136
81.48.102.166:133
118.248.244.146:225
88.23.154.106:219
234.161.108.154:261
Targets
-
-
Target
PRD.lnk
-
Size
1KB
-
MD5
ca9df40e1b6f6349a68ef7b1555b209e
-
SHA1
4f4638fef1f9bc68878fa57f447914678e6fd126
-
SHA256
c7279842afcbafc33f5e089d48a2b82e91d48e0f76a554e32dc6c99f3aafe49b
-
SHA512
26fb54dc463b99d5249cfac02f6fb860cf95af9f28d319b40ca838d422392f81121fbcde51cacbc2fe45bcc0e7523661c4962321acdd114ea01f4acba1eaf18c
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-