General
-
Target
bum.zip
-
Size
1.5MB
-
Sample
221004-ghn7qseecq
-
MD5
48fe6d2342dcb64e969ec3223b6f9784
-
SHA1
e14af464ff0c0371275ca277881abee7ef7f0f68
-
SHA256
1b873250e2d0374d7d2cc5ae6bbfbb8d445fbea18ad944873221d21275154fd8
-
SHA512
1bf7dccd0c36dc530e97a5b2416dd74bba8c6b6d4dc581c96f1174da342092b0335ab0816b8e3c6bbf15dfbcdafe02fefb904de56fe558e13c98aeb95fdd22f8
-
SSDEEP
49152:ekURV/o2MUtif3A2fBMv1vX/0vtzNJ+ZJzv9RdE0:YRV/iUa3uv1vX/E5SF5E0
Static task
static1
Malware Config
Extracted
bumblebee
0310
192.119.74.28:443
54.38.138.5:443
45.141.58.37:443
146.70.147.39:443
146.70.149.48:443
103.144.139.158:443
Targets
-
-
Target
run.bat
-
Size
67B
-
MD5
ef46329eecc2c91c386b561028302235
-
SHA1
50d5ce8dc61801dbd8b6f04c7eeb0b798cca3729
-
SHA256
9bcf2e5aa71263a581ab230e9101f21da63fc8a41f49bca7e4712192a71dc2eb
-
SHA512
ae8ce210d8008b6f1c04ae7271368e8b716393ac0d50ded0e68429c5a2c51a210412fe7e17f174039475442b4749ad1beb8adce5988d359c09abf7f1b99492d7
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-