General

  • Target

    details.xlsb.xlsx

  • Size

    208KB

  • Sample

    221021-2h8atshea9

  • MD5

    98636e940474f0bebfcc03db617aaf36

  • SHA1

    405dfe612512d6a0a04cb1fa8a9bd3238304edec

  • SHA256

    c25f5f86ab2aa4928dbc144a55a92ed5be6558787ac0f450d6411d85076547b7

  • SHA512

    90601425e5a388b4a188707a9ab72d07b4312092620e75354c144cf1d2a711bd251325d2d13ee72f3432fc1df4bdd0fed5c3a1644223aeea62dd27fa436ba98b

  • SSDEEP

    6144:KehHpGTRt0hgI/qm1Uz/SyQI9dTbmeo70uWoeJJggmA8:KehHYRt0Wax1ASrWfJaZA8

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

bumblebee

Botnet

2010m

C2

23.106.160.112:443

146.59.116.146:443

172.93.193.220:443

rc4.plain

Targets

    • Target

      details.xlsb.xlsx

    • Size

      208KB

    • MD5

      98636e940474f0bebfcc03db617aaf36

    • SHA1

      405dfe612512d6a0a04cb1fa8a9bd3238304edec

    • SHA256

      c25f5f86ab2aa4928dbc144a55a92ed5be6558787ac0f450d6411d85076547b7

    • SHA512

      90601425e5a388b4a188707a9ab72d07b4312092620e75354c144cf1d2a711bd251325d2d13ee72f3432fc1df4bdd0fed5c3a1644223aeea62dd27fa436ba98b

    • SSDEEP

      6144:KehHpGTRt0hgI/qm1Uz/SyQI9dTbmeo70uWoeJJggmA8:KehHYRt0Wax1ASrWfJaZA8

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks