Behavioral task
behavioral1
Sample
1696-55-0x0000000001F90000-0x00000000020D9000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1696-55-0x0000000001F90000-0x00000000020D9000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
1696-55-0x0000000001F90000-0x00000000020D9000-memory.dmp
-
Size
1.3MB
-
MD5
2e49f7b00f470c4c6f14adad4016fa2d
-
SHA1
8b4be2a26020755bb5cb5e4634a051c00dd0ccbc
-
SHA256
14d5e61c310133b75dec1253177e6374eb81426b915b9568de00b3dfe7820e29
-
SHA512
6b8c7ac919de8a32e92f9a6fccbc6e1f05c57df24834ca8fec8e790ad6896126562ba4a828089a763a891dfacd3a0a33dc95c08fc1becaf63baf4186a8a059c2
-
SSDEEP
24576:9pgBtVlZ+jZ3YFVTmHPtU69Zx/NIt1FMbV6iM34sF:bl3cRi159Zx/N6LMbVRMj
Malware Config
Extracted
bumblebee
1411
107.189.13.247:443
64.44.102.241:443
54.37.130.24:443
Signatures
-
Bumblebee family
Files
-
1696-55-0x0000000001F90000-0x00000000020D9000-memory.dmp.dll windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 318KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ