General
-
Target
JsUDviXDiDBFhx.dll
-
Size
1.8MB
-
Sample
220830-2npqnscgfr
-
MD5
bce81d0fe5a5f2ec833b1890fa8a1cc5
-
SHA1
6c1e9bea7c9e7057ef40946abb97a3e60026a61c
-
SHA256
d70e30304c53b7b9f9f5d4409f0ac9b6713709d45fdc1f1bf65fe9f1ad539d1d
-
SHA512
de6ca51763ae07548208da7931f992d26ab357141d6a1b1d54f54f66f83a7317756f6a6ae8c0a47e9d379c15eb4eecf8596c12c70cd9e8c7f888b0d16d1a46c0
-
SSDEEP
24576:0N874KCVg2wUnXrUupzjXxbXQvHYOsmzOTp+U7pXXUL7SmI5y0fvFj1kqRIN3Qtt:0N87jcHwgXr5tToHYOsmSTx7pXkOy
Static task
static1
Behavioral task
behavioral1
Sample
JsUDviXDiDBFhx.dll
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
2608
106.105.40.37:281
224.63.194.81:125
122.61.32.33:499
195.167.135.231:104
253.87.116.144:132
115.118.214.197:398
208.46.210.160:259
151.45.81.241:319
231.115.169.144:479
211.3.163.223:438
205.185.116.99:443
72.129.220.46:326
58.237.169.212:157
116.14.243.168:325
172.115.124.76:463
197.182.124.10:479
59.253.233.208:344
37.224.208.59:206
186.92.108.120:154
198.98.52.246:443
146.243.10.253:187
125.43.127.201:114
172.52.254.121:162
83.54.134.193:384
8.191.152.153:329
138.17.56.242:269
175.162.216.194:425
8.69.188.109:281
58.190.59.72:188
113.239.8.211:430
84.237.65.104:408
233.220.246.22:495
15.83.224.143:311
104.168.204.115:443
24.247.40.38:157
107.189.5.45:443
29.8.151.2:239
225.110.191.221:439
113.129.74.180:169
91.220.35.64:100
3.158.200.196:374
82.117.140.112:498
237.141.95.14:345
100.250.176.199:251
164.158.205.102:101
52.147.194.216:383
136.62.162.58:494
24.254.148.210:458
247.13.150.239:150
23.123.41.93:409
219.74.248.35:154
47.83.231.100:190
105.196.240.33:280
46.68.61.242:117
Targets
-
-
Target
JsUDviXDiDBFhx.dll
-
Size
1.8MB
-
MD5
bce81d0fe5a5f2ec833b1890fa8a1cc5
-
SHA1
6c1e9bea7c9e7057ef40946abb97a3e60026a61c
-
SHA256
d70e30304c53b7b9f9f5d4409f0ac9b6713709d45fdc1f1bf65fe9f1ad539d1d
-
SHA512
de6ca51763ae07548208da7931f992d26ab357141d6a1b1d54f54f66f83a7317756f6a6ae8c0a47e9d379c15eb4eecf8596c12c70cd9e8c7f888b0d16d1a46c0
-
SSDEEP
24576:0N874KCVg2wUnXrUupzjXxbXQvHYOsmzOTp+U7pXXUL7SmI5y0fvFj1kqRIN3Qtt:0N87jcHwgXr5tToHYOsmSTx7pXkOy
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-