General
-
Target
required documents.zip
-
Size
3.2MB
-
Sample
220908-c2k7zaafck
-
MD5
e90a8f435a6195e481568c18030722cd
-
SHA1
8a208ec067c7e4d6ac12d5c1c2bd16a00823d3dd
-
SHA256
34006f226a726c57ee055fa5520a333e34657db681ba4add71c580b2ea179fe2
-
SHA512
e9bdab4ce5c3c4ccea486278113a4c0eebcf24bcdc1cafd971fa15f58276387785b374d67c90002875b2f54fee29a2351e03865aa198302b0c8993fac7cc9101
-
SSDEEP
49152:qivSCQ/OKrPtUJMo3OqiLd/+VeKUiGOxjYSguvSfc:qivSCQ/jzaT
Static task
static1
Behavioral task
behavioral1
Sample
required documents.zip
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0709lg
253.99.168.157:367
114.13.1.160:226
34.113.116.119:165
204.227.208.101:422
90.128.124.215:224
95.45.92.109:292
211.135.230.28:111
199.40.74.224:435
85.230.106.25:390
189.255.181.14:334
213.227.154.169:443
232.196.162.145:304
214.20.238.201:145
87.216.172.198:397
171.201.228.43:398
87.63.40.34:125
120.83.66.17:278
34.65.29.63:243
45.153.240.94:443
232.179.211.66:291
233.228.105.224:221
193.11.177.213:238
186.218.162.100:196
95.54.17.61:431
215.155.35.33:309
205.5.165.193:253
191.215.252.12:299
190.104.233.232:454
30.4.135.103:343
24.64.244.156:187
3.17.97.51:305
3.110.118.231:273
194.140.110.231:247
228.57.16.249:115
226.124.246.118:179
253.102.241.231:316
186.40.222.142:173
146.132.130.18:100
16.28.192.164:130
219.150.99.178:460
204.235.52.15:241
104.121.55.132:124
172.238.228.106:169
46.189.108.213:259
5.149.200.203:181
7.41.78.160:194
24.84.58.88:201
217.244.142.77:452
75.25.196.244:194
213.233.43.49:438
163.104.136.59:134
118.189.229.22:297
Targets
-
-
Target
required documents.zip
-
Size
3.2MB
-
MD5
e90a8f435a6195e481568c18030722cd
-
SHA1
8a208ec067c7e4d6ac12d5c1c2bd16a00823d3dd
-
SHA256
34006f226a726c57ee055fa5520a333e34657db681ba4add71c580b2ea179fe2
-
SHA512
e9bdab4ce5c3c4ccea486278113a4c0eebcf24bcdc1cafd971fa15f58276387785b374d67c90002875b2f54fee29a2351e03865aa198302b0c8993fac7cc9101
-
SSDEEP
49152:qivSCQ/OKrPtUJMo3OqiLd/+VeKUiGOxjYSguvSfc:qivSCQ/jzaT
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-