General

  • Target

    document_invoice_0706-488.iso

  • Size

    2.9MB

  • Sample

    220706-vdbbzahbg9

  • MD5

    e67c33a21267bbdabc7da8a26dba9b43

  • SHA1

    0c611820e514c3408744785e16703e987bcdcdfc

  • SHA256

    26f9526506e03ed55f7273a962ed90af8ce429242bcdf10380b638f47921b1e9

  • SHA512

    22f7a1c3c0036c1c924a679630b645c402022953d4060947d5b87f0cbbd89fdac9239ee66267597d84f62dd42e76ea7edf3fc4e27e94626afddef63037aa6ec0

Malware Config

Extracted

Family

bumblebee

Botnet

507r

C2

146.19.173.184:443

41.15.71.157:274

66.9.9.138:154

36.201.196.202:367

173.200.61.240:100

116.241.116.41:410

242.232.106.206:162

10.195.46.61:489

249.112.226.98:243

130.242.219.205:423

154.56.0.113:443

179.5.59.188:228

217.246.42.10:346

169.197.227.201:474

231.228.102.246:186

185.165.82.120:182

74.230.15.244:376

94.88.121.46:403

120.181.249.142:177

138.141.158.45:217

rc4.plain

Targets

    • Target

      document_invoice_0706-488.iso

    • Size

      2.9MB

    • MD5

      e67c33a21267bbdabc7da8a26dba9b43

    • SHA1

      0c611820e514c3408744785e16703e987bcdcdfc

    • SHA256

      26f9526506e03ed55f7273a962ed90af8ce429242bcdf10380b638f47921b1e9

    • SHA512

      22f7a1c3c0036c1c924a679630b645c402022953d4060947d5b87f0cbbd89fdac9239ee66267597d84f62dd42e76ea7edf3fc4e27e94626afddef63037aa6ec0

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Registers COM server for autorun

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks