General
-
Target
request.zip
-
Size
922KB
-
Sample
220830-l7h48sggd4
-
MD5
66e25dc86d66ee7c8da2bc653cf11367
-
SHA1
382acd345cb21dddd3d0e4b13fccf2811af227dd
-
SHA256
c021cd6c46672918c040eb69b0f714d981c1c401b843f1e17e1e129d548f8b99
-
SHA512
e7c462aa7c1747236d0cf02d0118cfdbbdd6f79986be4389921e81c09e33bdba3a0a7633e943c047acafe52282dda614d32ec55961fa92b17648ba3355456952
-
SSDEEP
12288:7B3N4avM42eJlfVRz6MZx2CQ8rjVQZU1zk+qxOmnLbWtEN5rHSVwQg4/U75jhJ5b:HxpJlL6MZBvEUVQU3ENkGQg4cTJ5pJ
Static task
static1
Behavioral task
behavioral1
Sample
request/JwiggegecGrAtB.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
request/JwiggegecGrAtB.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
request/request.lnk
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
2908
64.44.98.213:443
100.113.3.207:189
248.191.121.15:332
169.102.141.78:250
161.202.4.242:333
112.151.217.255:451
185.17.40.189:443
10.41.59.121:290
229.229.228.155:345
147.254.231.107:449
105.222.222.48:403
87.37.138.133:474
67.120.105.118:346
159.140.31.255:474
88.205.174.117:143
163.164.171.23:319
111.231.132.164:372
212.58.118.174:298
138.20.6.192:225
156.130.113.183:393
5.194.51.93:490
45.147.230.179:443
251.167.6.17:485
203.111.215.76:284
44.187.116.7:456
76.116.10.102:135
208.179.197.250:133
181.176.243.222:183
26.204.100.76:414
121.43.192.113:427
46.214.156.84:190
106.28.254.209:115
149.116.146.218:446
188.227.42.29:146
49.51.247.30:212
83.25.144.125:340
22.177.99.14:395
167.23.140.145:440
216.103.5.255:213
120.163.45.27:327
118.130.236.121:396
80.169.35.47:161
172.188.238.183:442
167.193.200.165:222
15.131.217.123:108
218.133.129.139:266
187.95.121.165:317
158.145.140.219:296
169.26.105.46:173
224.61.48.90:287
199.239.153.79:429
186.78.76.199:181
182.231.155.237:114
Targets
-
-
Target
request/JwiggegecGrAtB.dll
-
Size
1.4MB
-
MD5
0452d7a9495c0d52cca77823d7ed038a
-
SHA1
10b2622cff8169d8925af69cb82e92741be4fa1c
-
SHA256
d61a8789efb9ce1d88d747e25b35bde938f7b749190470a29ec94334fca17259
-
SHA512
fb71ae9fb2a940d6c8226702475764118c3d6229e7d8501785c42d2cd99afca3b63928f7cdcab0ba626af2e4095b1f7cffa3fe4cb998649b036224fef83150b0
-
SSDEEP
24576:uYdzZyfNddAr0UjQ3YTF++P8rebQacJ0RVxPiW3IW/Hk0wGaW:uYNEfNYrZjAaF++dY0X6mIWfkHGa
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
request/request.lnk
-
Size
1KB
-
MD5
1cfeaa2c13c3f59448c13fd001716e00
-
SHA1
bd4c7d8eb86b76acfc15943ce447aed2279a3e96
-
SHA256
8407679b8a594a66db48cd92560fac278749e233531254a048215cc948f17d16
-
SHA512
12d752c7b7721a91e15ae0d3da41a66600a83446797f37d7f91f9e21d6bf443f053095331fa83fa01a64434a9738f09e1b19a188f74cfb0fb4c10c09def45da8
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-