General
-
Target
document.dll
-
Size
1.4MB
-
Sample
220703-trclhsach3
-
MD5
75052460162c6183646c2471656325e5
-
SHA1
0db5117a473a73e328557f5820eac40e7a154edc
-
SHA256
ea8e3b006b33d1a850a24ace898bef873902cbbd8911305f63ebd3cdeb4aff36
-
SHA512
a53795f21bd273a5b2ccd2edf047f546352ff7cb9413a6044d3752c4b83ecbab8e53da45449e24d5cfa08319d70eb2beae82026d767b4eb336f4cb474db60724
Static task
static1
Behavioral task
behavioral1
Sample
document.dll
Resource
win7-20220414-en
Malware Config
Extracted
bumblebee
306f
76.148.239.59:345
164.137.75.183:397
196.230.60.243:288
28.200.131.233:351
156.139.67.244:461
209.141.46.50:443
146.19.173.155:443
60.18.14.24:308
156.26.157.68:310
206.63.122.98:179
255.23.50.218:274
124.177.4.180:404
82.209.238.26:336
122.142.229.194:311
27.183.95.15:443
126.52.147.11:276
104.35.182.83:440
14.58.138.89:277
21.184.24.214:475
214.61.246.124:182
55.239.194.22:458
11.142.8.123:297
157.11.10.77:129
140.79.136.23:147
47.209.156.101:417
131.102.103.204:138
4.29.179.92:265
49.123.106.15:399
54.38.138.94:443
129.165.47.226:302
236.253.143.84:232
92.186.104.219:154
219.84.155.4:378
198.97.148.29:361
10.73.149.20:375
43.102.237.35:136
53.194.157.74:460
77.231.147.46:368
124.117.76.239:105
250.46.229.65:450
215.28.61.251:399
33.168.63.212:478
95.127.117.7:193
101.221.31.35:313
62.74.188.164:351
72.248.78.18:220
213.14.174.95:294
220.82.79.187:330
41.245.112.154:136
81.48.102.166:133
118.248.244.146:225
88.23.154.106:219
234.161.108.154:261
Targets
-
-
Target
document.dll
-
Size
1.4MB
-
MD5
75052460162c6183646c2471656325e5
-
SHA1
0db5117a473a73e328557f5820eac40e7a154edc
-
SHA256
ea8e3b006b33d1a850a24ace898bef873902cbbd8911305f63ebd3cdeb4aff36
-
SHA512
a53795f21bd273a5b2ccd2edf047f546352ff7cb9413a6044d3752c4b83ecbab8e53da45449e24d5cfa08319d70eb2beae82026d767b4eb336f4cb474db60724
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-