General
-
Target
HKpiLfqChJKPLc.dll
-
Size
1.2MB
-
Sample
220901-yme83aacgn
-
MD5
a2a55bdae16915aea3bc1933b04eb5e1
-
SHA1
83e2082f4b30e6475fdf0eeb435f7ef8500363a4
-
SHA256
6b3a8f1b3ee2f33912815aa18ed89184ffcc0ddf8619b7551aba216e20e1fe88
-
SHA512
46269e04b69f1e8fa6346905becfc3e3cfd08a4ec781b11ef4d16b7c4d70fba5186245986b31f68f57866f755c133c248d057e9ea5ccbbb83175e6905401a9f8
-
SSDEEP
24576:v2g6iSk124v3QMwo04WbKpHd/bq2Nf6lRcN5AWwem6EU0MmJO85:ug6iH13l04yK7/bERcLwBLKU
Static task
static1
Behavioral task
behavioral1
Sample
HKpiLfqChJKPLc.dll
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0109
238.135.187.178:122
139.250.85.120:389
48.125.193.25:152
114.213.187.231:380
111.253.120.98:250
226.62.116.55:344
167.157.111.216:424
172.237.68.92:206
16.58.16.45:200
250.119.214.35:204
3.103.169.104:449
241.138.197.72:484
217.78.123.134:168
111.153.255.170:258
44.157.167.56:261
88.38.249.218:141
124.110.55.236:298
248.92.195.241:424
244.202.83.43:409
106.233.170.108:279
96.188.217.60:173
84.221.218.120:100
159.104.75.166:346
213.231.246.58:435
51.83.249.204:443
120.87.37.168:153
110.167.91.68:459
178.191.59.83:434
40.30.44.164:172
136.79.37.133:189
120.80.124.185:480
2.166.110.196:427
231.97.171.162:497
25.78.72.70:139
35.177.159.176:486
146.70.106.163:443
77.107.57.122:103
89.1.246.38:325
96.36.139.9:434
25.65.103.99:483
152.209.117.91:451
166.219.247.189:324
63.230.197.221:147
145.104.166.182:111
15.187.236.25:452
64.44.102.36:443
254.198.4.244:141
229.79.74.203:286
64.242.165.29:184
21.191.58.147:232
58.58.251.238:386
65.48.107.106:127
146.12.117.63:181
Targets
-
-
Target
HKpiLfqChJKPLc.dll
-
Size
1.2MB
-
MD5
a2a55bdae16915aea3bc1933b04eb5e1
-
SHA1
83e2082f4b30e6475fdf0eeb435f7ef8500363a4
-
SHA256
6b3a8f1b3ee2f33912815aa18ed89184ffcc0ddf8619b7551aba216e20e1fe88
-
SHA512
46269e04b69f1e8fa6346905becfc3e3cfd08a4ec781b11ef4d16b7c4d70fba5186245986b31f68f57866f755c133c248d057e9ea5ccbbb83175e6905401a9f8
-
SSDEEP
24576:v2g6iSk124v3QMwo04WbKpHd/bq2Nf6lRcN5AWwem6EU0MmJO85:ug6iH13l04yK7/bERcLwBLKU
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-