General
-
Target
Desktop_20220907.zip
-
Size
1.1MB
-
Sample
220907-r7wyzscch4
-
MD5
5a1cb62d734e2e7f04bba41eb90df8dc
-
SHA1
3647e757bf91125824924ec6cacfe33abefef3ba
-
SHA256
7cc598a77e4808201dabb766c9b10f89b3a25bd0f50ee35e6bac5f57ca43f49d
-
SHA512
32e441bfbde1cac59b5685c71b9369ad3c60dff94da5c787e74e4dab39d01115ef8addd4d6fb58e004ee0d88507d9885bb6e946bfaefcff4abcd8d6b39048c72
-
SSDEEP
24576:P2KYgAtYePgeTQhwVxBDKT/XrPjh1cGf/yCUFIDAhxVu0DtocTzE:P2KV8YGgN4DUXrr3cUJDaHuutocTzE
Static task
static1
Behavioral task
behavioral1
Sample
DFSdDHyafGNBMb.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DFSdDHyafGNBMb.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
project info.lnk
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0709
8.88.91.79:136
167.76.161.23:157
77.177.118.96:231
69.233.15.174:491
117.146.34.48:461
23.200.170.60:184
170.246.180.67:323
37.140.146.139:221
130.209.86.69:354
146.92.77.172:282
182.27.60.90:232
49.120.53.41:234
17.27.91.226:169
103.144.139.135:443
122.241.46.136:429
107.69.244.155:270
104.168.243.204:443
185.216.240.69:197
52.45.172.134:339
6.230.209.231:316
198.98.59.54:443
119.1.238.159:237
95.54.236.204:277
243.54.17.14:105
246.255.30.66:152
120.168.230.193:365
28.186.144.22:459
142.202.200.105:283
228.231.12.109:215
32.103.37.152:185
35.12.228.216:414
248.107.236.19:347
103.90.180.149:308
59.69.64.76:213
35.115.91.249:472
186.54.87.62:322
67.79.169.59:349
112.41.250.48:224
17.131.11.187:459
81.213.123.89:352
114.95.108.99:391
27.214.218.60:212
159.196.125.136:458
27.150.71.81:147
252.70.152.171:488
100.97.149.119:362
65.104.139.214:460
14.162.27.208:336
20.220.107.121:269
150.159.60.124:463
136.151.108.82:424
131.201.79.189:120
118.77.223.230:102
Targets
-
-
Target
DFSdDHyafGNBMb.dll
-
Size
2.0MB
-
MD5
8f9387ca6c1e41ba72d508ec6ea4d5c4
-
SHA1
0064cee66185c74bf3ceef803338f5761f6f530a
-
SHA256
f1aa85cd3d3ed3d2b3ff8e705d81c32d2e7794208f7f7a76f7314ef408b897d2
-
SHA512
2cf22ab0f2ecf00d1fac9a12855ae98c46b2017e9ad0c95b495f1f1d28139a6fe05f288b2338a677c749f056c62e8ffa0bd5e53118b9a41c512a5bfac792ee09
-
SSDEEP
49152:8G7rRbE0bvTj0KvJirCjyGVgjuUTuD70644yeK:8MKATvJi
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
project info.lnk
-
Size
1KB
-
MD5
a3014c117e11c1116f9e51eb79529ab9
-
SHA1
d9acd73a1898a632bee558d4a0f96995352e1fc0
-
SHA256
d16b76e0b7e88750733ebc46df80708a539c60d936add5a4fba66f35d3ab260a
-
SHA512
8b72991786f5f27b3b56bc0cc239cdb24a6ee2649b311320b481f02c4972ea30d9a2e62e95a056fb8bf55b6c2d14d6d749f944d0ae29d2a2cbca9fdae9180dd8
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-