General
-
Target
Request-08-22-77.vhd
-
Size
6.0MB
-
Sample
220831-wcavgsbdb9
-
MD5
b93dc51a8e8fd9a2823568d16e647050
-
SHA1
a5b949649aeed6fb6c00ba9b96675f959635dcf6
-
SHA256
8ce84fae3e55520c041d70bdb90900060eff61c6f9c4282cb48a899e15db0f50
-
SHA512
65fde34b64a4e439933176817b9cd44afe70d2f60a5019ba326488fc12dc7ebeaf384d56c9a909b544cfaf56d365eb4601988bfa07863bfc13a330fd2d100c5a
-
SSDEEP
98304:xvxtD66xLrsxIpMKEngsfyJllGVeTQKP7:xvxcWcxIpM/nTfEl8Vef
Static task
static1
Behavioral task
behavioral1
Sample
GfsFepFIKsNGpt.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GfsFepFIKsNGpt.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
request.lnk
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
3108
54.203.130.81:428
103.160.22.125:439
100.194.5.156:279
138.10.128.167:465
16.68.199.17:119
49.58.238.45:318
158.121.21.147:265
76.179.109.138:320
219.114.206.84:318
242.123.229.45:306
247.142.48.124:278
137.128.84.3:389
178.18.89.43:472
68.72.230.54:206
253.1.172.156:320
88.12.127.219:297
113.50.222.178:284
135.21.140.60:404
64.44.102.36:443
247.232.101.39:263
25.164.199.235:483
229.34.16.142:331
161.192.84.102:421
92.50.58.134:268
150.69.136.89:264
117.250.45.148:196
193.19.186.178:227
80.161.122.170:210
51.83.249.204:443
244.56.215.21:367
146.70.106.163:443
22.226.202.236:160
5.98.161.45:407
169.173.118.1:482
241.97.45.244:361
25.22.207.178:454
33.152.14.249:176
225.69.64.137:234
66.123.133.120:125
233.57.245.52:193
175.88.206.214:229
12.171.4.209:360
203.176.214.111:334
22.233.59.206:201
81.135.6.89:355
151.147.0.228:393
129.92.194.112:238
249.69.235.102:423
131.243.196.86:251
135.47.154.49:225
225.22.137.126:322
18.153.76.23:229
189.3.235.110:232
Targets
-
-
Target
GfsFepFIKsNGpt.dll
-
Size
1.7MB
-
MD5
14da4c2df839237771865372ce4eee25
-
SHA1
5b0c15e551f989d1702478a50da3fac5bd3dff87
-
SHA256
32d3c8a61ba7a61d1f7466a4a60f7b52bb9bb0e6d000418da5cce79831f55a8c
-
SHA512
dd480f58734d0b5d1b53af599ca665422b1268263bceccd12b9103d95a4554b7b4b781af18eafefc3ba5713ad4cd18ba1513046bad10e7126894bca2761ece17
-
SSDEEP
49152:7mWxtD5wWHxLrApxq7pMKEngsfyJllGVeTQKP7:7vxtD66xLrsxIpMKEngsfyJllGVeTQKD
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
request.lnk
-
Size
1KB
-
MD5
1d0f13665c86358fa7ac3c9f6ea11aab
-
SHA1
85755e92d2a690eb47e12ef98034c6e7aeef467c
-
SHA256
cdac9fcc6ae12f37231ab1be5515275f1c301f7e10a542059ad0fb82174b30b3
-
SHA512
8596dadb49514ecc94c6cfad0b8e0b8c59ba9d4e01d61c1b54390f83c4261ba8ed3d8fc92535916f0fd3ca950961c5b90a319eb688a1a34d0f4748b2a65782a7
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-