General

  • Target

    connect.bat

  • Size

    1KB

  • Sample

    220919-tvdb8agdf4

  • MD5

    f6dfe4999a57ada167f090d6dc982837

  • SHA1

    e0577a468c99c77989a4c8f3da3a8e7c3a3860c6

  • SHA256

    81000ce700ba04ce8395d0e909d639a88b27e826fef40bfc173fab686a0bc362

  • SHA512

    11f7c3f6135c20e8c37ee289ee21009820775921b6e37f219e0c178ff0522168887c48683d88bd1e48b8bd30514a5e52ebd603b40f96d90a42046dfaeb4f3e16

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://meeronixt.com/gate

Extracted

Family

bumblebee

Botnet

1909

C2

108.177.235.29:443

23.106.160.117:443

23.106.215.133:443

rc4.plain

Targets

    • Target

      connect.bat

    • Size

      1KB

    • MD5

      f6dfe4999a57ada167f090d6dc982837

    • SHA1

      e0577a468c99c77989a4c8f3da3a8e7c3a3860c6

    • SHA256

      81000ce700ba04ce8395d0e909d639a88b27e826fef40bfc173fab686a0bc362

    • SHA512

      11f7c3f6135c20e8c37ee289ee21009820775921b6e37f219e0c178ff0522168887c48683d88bd1e48b8bd30514a5e52ebd603b40f96d90a42046dfaeb4f3e16

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks