General
-
Target
ta578_URLs_20220907.zip
-
Size
1.1MB
-
Sample
220907-wamfhahhhk
-
MD5
4d72f3209205a7caa9caf43e6c9de9be
-
SHA1
181bfc3600b06bb4385f3de7735c66e377e6c784
-
SHA256
734e3996a3fedd0744522f70a916d6affaad5fe56b52ef8903f27f1c0fe1337f
-
SHA512
cf5187824f3fe2e20bcc3b1e421924a2b6684d0b71e66ac01f744931e1327e35192e4357b8de9baaa48f0ba0622d51133fcdf95d35876c486634e1f66dcd07d6
-
SSDEEP
24576:BDJ3l+u05+iz0eT73ZSPOAUJxn8a86Tgi/qo8kyBl:B13l+p57Io73sCnX86T7y3kyBl
Static task
static1
Behavioral task
behavioral1
Sample
Documents.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Documents.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
ZRoeaQxZZMZDVb.dll
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0709lg
253.99.168.157:367
114.13.1.160:226
34.113.116.119:165
204.227.208.101:422
90.128.124.215:224
95.45.92.109:292
211.135.230.28:111
199.40.74.224:435
85.230.106.25:390
189.255.181.14:334
213.227.154.169:443
232.196.162.145:304
214.20.238.201:145
87.216.172.198:397
171.201.228.43:398
87.63.40.34:125
120.83.66.17:278
34.65.29.63:243
45.153.240.94:443
232.179.211.66:291
233.228.105.224:221
193.11.177.213:238
186.218.162.100:196
95.54.17.61:431
215.155.35.33:309
205.5.165.193:253
191.215.252.12:299
190.104.233.232:454
30.4.135.103:343
24.64.244.156:187
3.17.97.51:305
3.110.118.231:273
194.140.110.231:247
228.57.16.249:115
226.124.246.118:179
253.102.241.231:316
186.40.222.142:173
146.132.130.18:100
16.28.192.164:130
219.150.99.178:460
204.235.52.15:241
104.121.55.132:124
172.238.228.106:169
46.189.108.213:259
5.149.200.203:181
7.41.78.160:194
24.84.58.88:201
217.244.142.77:452
75.25.196.244:194
213.233.43.49:438
163.104.136.59:134
118.189.229.22:297
Targets
-
-
Target
Documents.lnk
-
Size
1KB
-
MD5
62c2908779e9d600b7f173349b4e0336
-
SHA1
6cdb058004c035650018a2467c61ac9c70c103b4
-
SHA256
1b566c56ec82909b3022ca375323a9fee0ccbbd86a8a8735ffc352f4a035b969
-
SHA512
2d9edca7584c4abcd741b4b206536dd55165b2a08e9c634d7c98dd29885f66eb3ebf112581e03fa058f3332aff7dc238c1b14e4818a9bf715c7a5360a6c3cf42
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
ZRoeaQxZZMZDVb.dll
-
Size
2.0MB
-
MD5
29a405557da7bb24b2f278c5c46dfd3c
-
SHA1
a089591a65546d9f25e769c7f22b0c61e1836223
-
SHA256
0e3933b1489a91bfe99dd652d7e64c09380b210d2404f32b26251d34fa58ca8b
-
SHA512
b332d39986610cc8a1e816d567107778f5c9e45d6bf55c614e673f5853b990abb312a052773afba6eb8a0fb3f5d942d010f7188ccf36f79f3e8a86c7e65731ba
-
SSDEEP
49152:wivSCQ/OKrPtUJMo3OqiLd/+VeKUiGOxjYSguvSfc:wivSCQ/jzaT
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-