General
-
Target
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85
-
Size
2.0MB
-
Sample
220708-mvrraadhd4
-
MD5
b38e751e7101c3cc163c6fd77fda959f
-
SHA1
ef125f6a233f7036157d38a02ad09de8226adc13
-
SHA256
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85
-
SHA512
8c0d7434419e07d27d772239ae2c32bd95ad57979e10a8bd7808f1f21215b42ff9497c430127a8b3ec77f9544f9a11a078c1af45776fea1d69775625928c0819
Static task
static1
Behavioral task
behavioral1
Sample
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85.dll
Resource
win7-20220414-en
Malware Config
Extracted
bumblebee
707a
172.240.175.194:183
171.85.135.192:358
223.7.203.157:407
45.153.242.183:443
211.68.220.197:102
174.119.130.65:369
202.41.22.30:314
58.10.113.168:308
12.33.69.160:285
205.185.123.137:443
112.188.178.13:332
168.205.228.104:480
83.218.135.147:151
228.175.209.140:269
240.114.36.128:411
8.109.227.172:304
142.11.245.185:443
214.233.117.120:167
198.135.200.7:254
73.74.56.146:272
14.42.55.81:416
15.237.42.8:408
159.192.221.167:410
197.26.182.136:279
41.140.44.116:454
161.144.98.94:427
46.208.205.43:235
37.231.14.207:370
183.236.246.8:410
41.232.231.227:382
47.225.45.93:285
162.191.88.20:114
114.170.141.82:227
90.86.27.214:238
117.176.252.35:344
247.184.192.227:394
95.26.242.141:126
75.146.161.164:331
15.14.147.134:401
50.69.254.239:246
69.181.36.251:119
53.34.28.231:447
44.245.217.17:369
237.57.151.39:372
103.175.16.105:443
67.35.182.6:434
146.19.173.31:443
20.189.66.15:257
105.221.27.232:344
88.82.146.11:254
204.63.253.164:476
191.159.75.135:494
214.207.26.205:301
16.182.11.140:166
45.135.162.238:267
Targets
-
-
Target
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85
-
Size
2.0MB
-
MD5
b38e751e7101c3cc163c6fd77fda959f
-
SHA1
ef125f6a233f7036157d38a02ad09de8226adc13
-
SHA256
ae55a2fd04b046681718c4c0c527faaa4f951980cd8d619ab512a98a32d61c85
-
SHA512
8c0d7434419e07d27d772239ae2c32bd95ad57979e10a8bd7808f1f21215b42ff9497c430127a8b3ec77f9544f9a11a078c1af45776fea1d69775625928c0819
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-