General
-
Target
files.zip
-
Size
1.6MB
-
Sample
221003-wstmjaacgm
-
MD5
8fba3c243b5dd9da15ec8ce3dd28c86d
-
SHA1
8b73e1098d37259e208f091963c64344c09932f0
-
SHA256
8c3089133607bfd2a73d5f06ea60b7aca0989bedfd7a503e0beda16249a9e83d
-
SHA512
3fa776f26347b99f3c856558f5afac56e2a51b9ac524fabb3e90867457d081b6f3256babd26d3fd8b0cb006d762ce731046abc6631a4f637c68e0fd34c1317ad
-
SSDEEP
49152:KLYW9C7Rz3Pii7+NgrRhB4d4zEb3FoFaddFQmjE17E6:OYRTqioM4d4QrWFaJjY7E6
Static task
static1
Behavioral task
behavioral1
Sample
PnrirLoslBOSWR.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PnrirLoslBOSWR.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
lqDwAhoXOlNwLd.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
lqDwAhoXOlNwLd.dll
Resource
win10v2004-20220812-en
Malware Config
Extracted
bumblebee
2609
209.141.48.135:443
142.11.241.215:443
146.59.116.77:443
Targets
-
-
Target
PnrirLoslBOSWR.bat
-
Size
1KB
-
MD5
6fe0cff624e47547185b869db1d72f45
-
SHA1
ed28b0e2acc7e357152001fbeffdbea6ceab0230
-
SHA256
4685e7be2b60d0edc5480a4befbac6130dc65c7bd149f6010b86d24a601bcb3f
-
SHA512
1613a4eec4e9f62379458e0c1d3fcd5de453174f445a8ebd673ca1cb22f26f32d2b58bd0da094deed14af8d1ed7a3f7bf3e026702c751883c81e79c7890aa654
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
details.lnk
-
Size
995B
-
MD5
b5d21515040f492ecf2cdab2cecbee04
-
SHA1
6a288e044cefd4c83fdd07899445755a3e4cdfd4
-
SHA256
ae3360b50c116599a7cb2750c896e4223097e8c7224242d5844ebee0808c089f
-
SHA512
0bd2564b4c078685a7fa321d55655ee8c65a2c559bff231c0d17c80776e8e36d8b251aee85f1e3000e436e03266dab58954640058861a122d71d1d601efe999c
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
lqDwAhoXOlNwLd.dll
-
Size
2.8MB
-
MD5
facf173726f6b3c0dfc6bff5b223e67b
-
SHA1
d26afc80fb12850d46683b8c217e07dd96277963
-
SHA256
07240bc14c34f1bcac94a19e0d5e6331d98717a65b76f7a106216a41de782a8c
-
SHA512
230800d537c32f8329dca1e54fc7c73cc35c809f6eb4f169dc79f4d91c155665f159b5cfc203c584970807b95c5975323690288b703c1f2c7136f4b6e176e3ed
-
SSDEEP
49152:cUV3v7mzyveqNwoqmTL93qSsgMObQGkCxnkaugjSo51OZ+BCPe6UNb/ed9rg2UsL:bmehNdqiL93qs3bZkCxnkTgjSovh6+bG
Score3/10 -