General
-
Target
07m2se.zip
-
Size
889KB
-
Sample
220706-vchdwsfadq
-
MD5
e195a7a25fe6c9be4d74c40664abaa94
-
SHA1
ad61e47875db7fc97c00596af422cbcd7d0b9d39
-
SHA256
50c6618f82461059cbe4ee858759d39f990e4431dac74adbe345e8678f0f82ac
-
SHA512
1ddf327834d0c6bc06a269f629d7c28ddb86784ea1aa5c41bd4abb22b1d8a2468702cc4203498924c4b6e0044800f21325baaf3f7c196a2809604a3708ce3ad3
Static task
static1
Behavioral task
behavioral1
Sample
07m2se/documents.lnk
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
07m2se/documents.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
07m2se/o7m2se.dll
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
07m2se/o7m2se.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
bumblebee
507r
146.19.173.184:443
41.15.71.157:274
66.9.9.138:154
36.201.196.202:367
173.200.61.240:100
116.241.116.41:410
242.232.106.206:162
10.195.46.61:489
249.112.226.98:243
130.242.219.205:423
154.56.0.113:443
179.5.59.188:228
217.246.42.10:346
169.197.227.201:474
231.228.102.246:186
185.165.82.120:182
74.230.15.244:376
94.88.121.46:403
120.181.249.142:177
138.141.158.45:217
128.79.29.175:298
104.168.200.192:443
196.168.84.24:372
143.27.231.233:335
133.99.126.202:263
222.202.140.206:438
117.172.191.115:471
158.208.5.127:269
218.155.13.204:130
219.110.187.248:435
209.244.102.105:112
23.19.58.212:443
4.177.13.86:289
204.223.28.129:424
246.134.183.74:364
165.132.190.127:368
89.159.155.176:455
185.69.113.39:124
47.26.53.19:195
41.70.42.112:452
74.219.241.225:481
66.15.189.146:122
28.23.200.103:366
159.248.192.111:424
170.88.0.154:120
79.196.23.192:106
146.70.106.76:443
249.57.205.117:166
62.82.188.190:234
221.131.148.148:357
206.245.228.10:133
51.68.146.186:443
118.89.112.82:338
116.205.234.96:247
205.160.222.15:274
Targets
-
-
Target
07m2se/documents.lnk
-
Size
2KB
-
MD5
516c04aa962dfa0e35e7c992c0eb88a9
-
SHA1
0ebc08f00d9eb38a72b43be9809162d3362a35de
-
SHA256
a7885b210054b39cb48f1f95a6697480dfa5f81f5439b69b493ae36a0266d1df
-
SHA512
92a0fa2f6c7dab55bf60079b33a00dd96aabc19a4a391bfc458a696da62e78035e251f7856a2f4c5665db115305f0aef97c5ab4fd4571c96a147b79fc370e1fe
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
07m2se/o7m2se.dll
-
Size
1.5MB
-
MD5
aa24e9ee74b1ad6d41c59dbf31d7f710
-
SHA1
41a51bf7fa95bc229a9f6fa6a6d91a05404c996b
-
SHA256
c6b2d8db11137aa172cacfba7e63f05664a9888b97b72082d0da1f7eaecd8468
-
SHA512
7271b898af8c50aec37fd5fcd0f0e73cddae480a86cb3110b6411217c67b33346cc527cfa0cdb72a6f7a9ef838b347b5d2f4cbd917ad9762cdcf44e0e18f01d6
Score3/10 -