General
-
Target
7991976155.zip
-
Size
1.7MB
-
Sample
220915-nk69nagfbl
-
MD5
6513227c631b99ff7954611dae63aec0
-
SHA1
7abe610537a832ed506713d4d76904c3b1761af1
-
SHA256
fb4d8eab720bfa491d4cd6dc732bb6d2f74c77a37c8056d7eafdb7a01bcba3bd
-
SHA512
d1d745e45ce29a1c889331307229af85ce0dd37522fe4da7b408ca29bf6b448952cab09ad6d6dfad87d9c01567e3823fa726d1504934e5ee118a549a94063850
-
SSDEEP
49152:2jvkPJP3kYN+nnb3ikBoD6BGcbDrNEKcKXVG2Y:2jvwN3kRnb3ikBTxbVLm
Static task
static1
Behavioral task
behavioral1
Sample
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
9n3.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
9n3.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
document.lnk
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
VPS1
45.147.229.23:443
Targets
-
-
Target
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8
-
Size
2.5MB
-
MD5
a91ca42fe60d0c2d1008e909c8b23cb5
-
SHA1
14f812a695879f33acc81ab32568ed974cdfbea1
-
SHA256
ad1a90f2f253a9adf45be85682d7b44994ab4e8ceafc1a5805316c39c803ccc8
-
SHA512
d409e627d458d753fff8e888f3e211ebf5ad6a11e21b30811e4e46f398f7fa93a033deb97c8acc6e0a5b98c852cc0b773c83cbbad4130db3d3f8a5ae06f8e232
-
SSDEEP
49152:/Y8+6OwVQpMQ08Fk1BGrXN3fLXZOMU9EeF2gYNpJsv9:/g6OXp0KC0rXptVeum
Score3/10 -
-
-
Target
9n3.dll
-
Size
2.5MB
-
MD5
7c3eacc5af118753850b18ed37aec4fd
-
SHA1
15e1cd059e3cb6d6e63bd2c7718844b917f42705
-
SHA256
3ecd8e4cab18d088b8394b6880fb00e6d17d8fe19ba2b0f7f7abd9cb738a3f54
-
SHA512
db731a0a387e8cecc499ef90415ddee213526f4fffe2fc0394855b77b1602f2cfbd0817031a1bc47d8650d84e0268baeb27f3ffdd72a1ab26c52080b664e6a09
-
SSDEEP
49152:EY8+6OwVQpMQ08Fk1BGrXN3fLXZOMU9EeF2gYNpJsv9:Eg6OXp0KC0rXptVeum
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
-
-
Target
document.lnk
-
Size
823B
-
MD5
90442d37ab692ae4654ef8462bd3c1fd
-
SHA1
3ef15315d9a4b7a557937df3377ad4d7f4be6e85
-
SHA256
0332e171c940c7f8fe48a803022cd327f588b12e71ecc3bf04bfc97d85a76bea
-
SHA512
388573ffaef1fab7a408bcc636bb43f1402f51bca76af740f8b654e12a43900165c0b3d96d3d5230ab377a87959e572a41dfdf8a37dc3b0b4a43af9afeb91b51
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-