General
-
Target
newfile43.xlsm
-
Size
56KB
-
Sample
221110-gwn4wshbgm
-
MD5
042d1ae5cc4063907200d18f59e4410e
-
SHA1
2244f8d0d336801b2280cec5c47c08c5119d8be1
-
SHA256
71a31230604bf678a60842f7625912b27270972f1e9b0e76ea21848ee50be9d4
-
SHA512
e7a3fb9c73e02e0f0e59b212b33eb15adf0ef8447be9498f9ccafc4eaccd41a28e68070c2d7317ed3d5c8c5b1933eeb51446dff4818166752f845f95e33370ed
-
SSDEEP
768:m9x2KUlxWpt1J3S5f3v4Jfa3ODVs3KnooaRHIuZVvZbV1sNl1A6u4:eHUlxWLC5/wJi3eVsdtLVvT1US4
Static task
static1
Behavioral task
behavioral1
Sample
newfile43.xlsm
Resource
win7-20220812-en
Malware Config
Extracted
bumblebee
0411r
172.86.121.123:443
176.223.165.125:443
45.66.248.216:443
Targets
-
-
Target
newfile43.xlsm
-
Size
56KB
-
MD5
042d1ae5cc4063907200d18f59e4410e
-
SHA1
2244f8d0d336801b2280cec5c47c08c5119d8be1
-
SHA256
71a31230604bf678a60842f7625912b27270972f1e9b0e76ea21848ee50be9d4
-
SHA512
e7a3fb9c73e02e0f0e59b212b33eb15adf0ef8447be9498f9ccafc4eaccd41a28e68070c2d7317ed3d5c8c5b1933eeb51446dff4818166752f845f95e33370ed
-
SSDEEP
768:m9x2KUlxWpt1J3S5f3v4Jfa3ODVs3KnooaRHIuZVvZbV1sNl1A6u4:eHUlxWLC5/wJi3eVsdtLVvT1US4
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-