General
-
Target
NOwPpfBRiTFTYD.dll
-
Size
1.8MB
-
Sample
220906-znw4msfden
-
MD5
b3ab9b4d0f69155cc7df3f72b647afc1
-
SHA1
4698056d14689edbf8d7ef1d6b0b327644eecee5
-
SHA256
8bf1c0d4bf445006046e26fce66e8c45d034c23ec3f73a14d5230b090bf3662d
-
SHA512
8de0d2cf3be709740e5205bfcb3dbff9077cbaa1ec6cd3c52f7b36d7c6e23940c4230e8c378d0f575952f9120c46e9f44008a4a9f2b52032d9671692bdd8e3d5
-
SSDEEP
24576:T3HZCk3SJpRELLhZZ63PdojKS9S5Kz+qKyTENoQk9jYfcoucV:T3HZCKLJKVoj/YtOFYfcIV
Static task
static1
Behavioral task
behavioral1
Sample
NOwPpfBRiTFTYD.dll
Resource
win7-20220901-en
Malware Config
Extracted
bumblebee
0609
84.167.88.233:345
215.145.61.202:308
137.40.97.52:338
246.203.125.82:132
70.248.138.150:450
246.254.85.162:227
101.50.12.208:402
14.62.107.26:472
205.185.121.173:443
177.8.108.125:102
187.128.248.53:325
107.189.1.156:443
85.76.146.210:369
41.1.133.165:470
249.69.10.40:322
155.198.230.103:351
33.11.192.227:449
28.229.156.200:263
159.128.17.14:415
46.67.127.195:493
208.216.25.193:250
220.13.251.119:331
108.90.104.11:287
123.239.27.225:337
50.159.69.41:237
24.198.233.171:341
125.239.243.198:469
69.103.210.138:419
158.173.253.217:225
168.133.238.36:190
86.195.214.92:250
214.124.190.40:172
175.206.149.152:313
12.19.236.28:397
152.179.209.102:440
243.11.15.0:286
108.117.245.10:312
219.141.84.9:296
32.36.123.174:334
130.127.46.124:211
8.39.213.130:478
3.173.254.247:114
57.182.63.216:185
192.236.155.47:443
194.90.154.20:369
106.44.131.19:389
163.138.203.210:126
48.208.56.14:209
16.247.46.70:498
140.236.200.163:340
188.92.158.199:348
112.163.138.190:499
130.32.255.95:152
Targets
-
-
Target
NOwPpfBRiTFTYD.dll
-
Size
1.8MB
-
MD5
b3ab9b4d0f69155cc7df3f72b647afc1
-
SHA1
4698056d14689edbf8d7ef1d6b0b327644eecee5
-
SHA256
8bf1c0d4bf445006046e26fce66e8c45d034c23ec3f73a14d5230b090bf3662d
-
SHA512
8de0d2cf3be709740e5205bfcb3dbff9077cbaa1ec6cd3c52f7b36d7c6e23940c4230e8c378d0f575952f9120c46e9f44008a4a9f2b52032d9671692bdd8e3d5
-
SSDEEP
24576:T3HZCk3SJpRELLhZZ63PdojKS9S5Kz+qKyTENoQk9jYfcoucV:T3HZCKLJKVoj/YtOFYfcIV
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-