General
-
Target
test2.zip
-
Size
910KB
-
Sample
220706-q8pqmadebk
-
MD5
149bd819b24b23b7b128992c80c63472
-
SHA1
0c4c15695e883669135e8f5a17a4a923a7efca08
-
SHA256
2ddc95bdefc8b2ed6a0be6a470279e26d9c387ad164610ab0028116241697a1a
-
SHA512
db3c86b3c041fccd8d441a3f573b753db66d03d36af3e286e9c72710c61c80d94b04d601a7270f8c527d5cba0590af7f139043943f70c01fa0dd20b695817b90
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
o7m2se.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
o7m2se.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
507r
146.19.173.184:443
41.15.71.157:274
66.9.9.138:154
36.201.196.202:367
173.200.61.240:100
116.241.116.41:410
242.232.106.206:162
10.195.46.61:489
249.112.226.98:243
130.242.219.205:423
154.56.0.113:443
179.5.59.188:228
217.246.42.10:346
169.197.227.201:474
231.228.102.246:186
185.165.82.120:182
74.230.15.244:376
94.88.121.46:403
120.181.249.142:177
138.141.158.45:217
128.79.29.175:298
104.168.200.192:443
196.168.84.24:372
143.27.231.233:335
133.99.126.202:263
222.202.140.206:438
117.172.191.115:471
158.208.5.127:269
218.155.13.204:130
219.110.187.248:435
209.244.102.105:112
23.19.58.212:443
4.177.13.86:289
204.223.28.129:424
246.134.183.74:364
165.132.190.127:368
89.159.155.176:455
185.69.113.39:124
47.26.53.19:195
41.70.42.112:452
74.219.241.225:481
66.15.189.146:122
28.23.200.103:366
159.248.192.111:424
170.88.0.154:120
79.196.23.192:106
146.70.106.76:443
249.57.205.117:166
62.82.188.190:234
221.131.148.148:357
206.245.228.10:133
51.68.146.186:443
118.89.112.82:338
116.205.234.96:247
205.160.222.15:274
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
516c04aa962dfa0e35e7c992c0eb88a9
-
SHA1
0ebc08f00d9eb38a72b43be9809162d3362a35de
-
SHA256
a7885b210054b39cb48f1f95a6697480dfa5f81f5439b69b493ae36a0266d1df
-
SHA512
92a0fa2f6c7dab55bf60079b33a00dd96aabc19a4a391bfc458a696da62e78035e251f7856a2f4c5665db115305f0aef97c5ab4fd4571c96a147b79fc370e1fe
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
o7m2se.dll
-
Size
1.5MB
-
MD5
d808582a5e6f1552c7c9b73a78d85730
-
SHA1
fa43018b94a710ae297ababf973d7bcfc241fbb2
-
SHA256
b7668bc3a19d39e11ca96e22acc77b4ab5ebb8aeac59235299c6008959129929
-
SHA512
f0e2d1ecd9e287cdd1f6b846d08adc129ed301612f174c09b31d984fcea3912daa9d65f8497e6a0e289869bb634359d5e8cb01455566aca3234682c7f968792b
Score3/10 -