General
-
Target
KcZmTWntdDTIOB.dll
-
Size
1.3MB
-
Sample
220830-lr5nasfbbk
-
MD5
ded3f8dbe77045060f65ad7a4c27a567
-
SHA1
f49e9840be5077139a57ed487a6ff86717120b28
-
SHA256
df19530dba164f8209342cc992fc2822dc233d025affa9a5f8134dc822a5e334
-
SHA512
efa4b914302b6886b6e954a37942b6c1a339808476c4b29df356f9339a851c37084f996e87814f2ae7d099bc96e28f64d19547493f7c951aed7254828d553705
-
SSDEEP
24576:ts2hTjqX3PE7W5OIw1KMSQcH/DEQur1NNpNtfEKBKeQ7ENH:ts2ljqvEz1zSZwQuJNNHhEKBKe
Static task
static1
Behavioral task
behavioral1
Sample
KcZmTWntdDTIOB.dll
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
2908
64.44.98.213:443
100.113.3.207:189
248.191.121.15:332
169.102.141.78:250
161.202.4.242:333
112.151.217.255:451
185.17.40.189:443
10.41.59.121:290
229.229.228.155:345
147.254.231.107:449
105.222.222.48:403
87.37.138.133:474
67.120.105.118:346
159.140.31.255:474
88.205.174.117:143
163.164.171.23:319
111.231.132.164:372
212.58.118.174:298
138.20.6.192:225
156.130.113.183:393
5.194.51.93:490
45.147.230.179:443
251.167.6.17:485
203.111.215.76:284
44.187.116.7:456
76.116.10.102:135
208.179.197.250:133
181.176.243.222:183
26.204.100.76:414
121.43.192.113:427
46.214.156.84:190
106.28.254.209:115
149.116.146.218:446
188.227.42.29:146
49.51.247.30:212
83.25.144.125:340
22.177.99.14:395
167.23.140.145:440
216.103.5.255:213
120.163.45.27:327
118.130.236.121:396
80.169.35.47:161
172.188.238.183:442
167.193.200.165:222
15.131.217.123:108
218.133.129.139:266
187.95.121.165:317
158.145.140.219:296
169.26.105.46:173
224.61.48.90:287
199.239.153.79:429
186.78.76.199:181
182.231.155.237:114
Targets
-
-
Target
KcZmTWntdDTIOB.dll
-
Size
1.3MB
-
MD5
ded3f8dbe77045060f65ad7a4c27a567
-
SHA1
f49e9840be5077139a57ed487a6ff86717120b28
-
SHA256
df19530dba164f8209342cc992fc2822dc233d025affa9a5f8134dc822a5e334
-
SHA512
efa4b914302b6886b6e954a37942b6c1a339808476c4b29df356f9339a851c37084f996e87814f2ae7d099bc96e28f64d19547493f7c951aed7254828d553705
-
SSDEEP
24576:ts2hTjqX3PE7W5OIw1KMSQcH/DEQur1NNpNtfEKBKeQ7ENH:ts2ljqvEz1zSZwQuJNNHhEKBKe
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-