General
-
Target
applications-09-22-18.vhd
-
Size
6.0MB
-
Sample
220901-ynvedacdg7
-
MD5
49ef54a9366c589c0f1b6e13d0997932
-
SHA1
3b85704b450414275fc59431b06fa7f4f91a7344
-
SHA256
1914b8c8cbb22ccebcdeb2c968e41f9113c9ea02179bae858cb76e477c3eb0b7
-
SHA512
875ea124c3a98232f17acf10888d2a00964e1bf37488cc11b6fb1171ead8722b463a0dab396ce1ddd788c681faa6c0bda867f608fd1ca8ef95133071ed48927b
-
SSDEEP
24576:K2g6iSk124v3QMwo04WbKpHd/bq2Nf6lRcN5AWwem6EU0MmJO85:3g6iH13l04yK7/bERcLwBLKU
Static task
static1
Behavioral task
behavioral1
Sample
HKpiLfqChJKPLc.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HKpiLfqChJKPLc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
applications.lnk
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0109
238.135.187.178:122
139.250.85.120:389
48.125.193.25:152
114.213.187.231:380
111.253.120.98:250
226.62.116.55:344
167.157.111.216:424
172.237.68.92:206
16.58.16.45:200
250.119.214.35:204
3.103.169.104:449
241.138.197.72:484
217.78.123.134:168
111.153.255.170:258
44.157.167.56:261
88.38.249.218:141
124.110.55.236:298
248.92.195.241:424
244.202.83.43:409
106.233.170.108:279
96.188.217.60:173
84.221.218.120:100
159.104.75.166:346
213.231.246.58:435
51.83.249.204:443
120.87.37.168:153
110.167.91.68:459
178.191.59.83:434
40.30.44.164:172
136.79.37.133:189
120.80.124.185:480
2.166.110.196:427
231.97.171.162:497
25.78.72.70:139
35.177.159.176:486
146.70.106.163:443
77.107.57.122:103
89.1.246.38:325
96.36.139.9:434
25.65.103.99:483
152.209.117.91:451
166.219.247.189:324
63.230.197.221:147
145.104.166.182:111
15.187.236.25:452
64.44.102.36:443
254.198.4.244:141
229.79.74.203:286
64.242.165.29:184
21.191.58.147:232
58.58.251.238:386
65.48.107.106:127
146.12.117.63:181
Targets
-
-
Target
HKpiLfqChJKPLc.dll
-
Size
1.2MB
-
MD5
a2a55bdae16915aea3bc1933b04eb5e1
-
SHA1
83e2082f4b30e6475fdf0eeb435f7ef8500363a4
-
SHA256
6b3a8f1b3ee2f33912815aa18ed89184ffcc0ddf8619b7551aba216e20e1fe88
-
SHA512
46269e04b69f1e8fa6346905becfc3e3cfd08a4ec781b11ef4d16b7c4d70fba5186245986b31f68f57866f755c133c248d057e9ea5ccbbb83175e6905401a9f8
-
SSDEEP
24576:v2g6iSk124v3QMwo04WbKpHd/bq2Nf6lRcN5AWwem6EU0MmJO85:ug6iH13l04yK7/bERcLwBLKU
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
applications.lnk
-
Size
1KB
-
MD5
61f4534b554463ef5a6c0695f78c1863
-
SHA1
a0373390cdc6edce5af66b0c9657f9cd63d3ab78
-
SHA256
201199f2481044b6f4252e0109d09bb7bd170715d401ed5762539992557455b7
-
SHA512
79d38cf25d8bc012016ff737c7a3d9923bb831b731c3fe298030a887883d1b65cd67919e7a6658de74683b80af0cb303b1c3069fdb1eb10fd1293f1d997fbb98
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-