General
-
Target
20220706_zippedISO_2.zip
-
Size
910KB
-
Sample
220706-rfsr9adegp
-
MD5
0750bcb0c4885e8f43f964f913cc6654
-
SHA1
206e1bf99d3b9ffffaa9565f46e605a2c2d1d6c1
-
SHA256
4cf6f3e5a5d4aa5855df82d40963e46c2fe42876b692ff9f2e535c03cdcc4cd1
-
SHA512
4df8dc71e372c51d4ee75da203b4fc4bf36ed23d3be6886c5191a57c532515a4367f52dcd3e1274dad0ca81a0c671581c6318e8107fa8138b4e2ae4d7c34496a
Static task
static1
Behavioral task
behavioral1
Sample
documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
o7m2se.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
o7m2se.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
507r
146.19.173.184:443
41.15.71.157:274
66.9.9.138:154
36.201.196.202:367
173.200.61.240:100
116.241.116.41:410
242.232.106.206:162
10.195.46.61:489
249.112.226.98:243
130.242.219.205:423
154.56.0.113:443
179.5.59.188:228
217.246.42.10:346
169.197.227.201:474
231.228.102.246:186
185.165.82.120:182
74.230.15.244:376
94.88.121.46:403
120.181.249.142:177
138.141.158.45:217
128.79.29.175:298
104.168.200.192:443
196.168.84.24:372
143.27.231.233:335
133.99.126.202:263
222.202.140.206:438
117.172.191.115:471
158.208.5.127:269
218.155.13.204:130
219.110.187.248:435
209.244.102.105:112
23.19.58.212:443
4.177.13.86:289
204.223.28.129:424
246.134.183.74:364
165.132.190.127:368
89.159.155.176:455
185.69.113.39:124
47.26.53.19:195
41.70.42.112:452
74.219.241.225:481
66.15.189.146:122
28.23.200.103:366
159.248.192.111:424
170.88.0.154:120
79.196.23.192:106
146.70.106.76:443
249.57.205.117:166
62.82.188.190:234
221.131.148.148:357
206.245.228.10:133
51.68.146.186:443
118.89.112.82:338
116.205.234.96:247
205.160.222.15:274
Targets
-
-
Target
documents.lnk
-
Size
2KB
-
MD5
516c04aa962dfa0e35e7c992c0eb88a9
-
SHA1
0ebc08f00d9eb38a72b43be9809162d3362a35de
-
SHA256
a7885b210054b39cb48f1f95a6697480dfa5f81f5439b69b493ae36a0266d1df
-
SHA512
92a0fa2f6c7dab55bf60079b33a00dd96aabc19a4a391bfc458a696da62e78035e251f7856a2f4c5665db115305f0aef97c5ab4fd4571c96a147b79fc370e1fe
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
o7m2se.dll
-
Size
1.5MB
-
MD5
53e39a08c5136787aecaf107f9e0c259
-
SHA1
2a64185b5fa2a0e5c30974b4624c31e668f8fadd
-
SHA256
e2a4f0f0954cf69f16c7672f6415f80c78492602bb82dc5009b4efde81521d48
-
SHA512
642493d839fd9a147c6d02a907cc2b898ffb91c1415359f22f8b1698dce6daa82fa23a26f5d099b837f11185dedafaa12c96e1e9fc5eff9d86a8a6917fa9c638
Score3/10 -