General
-
Target
AcrobatInstaller.lnk
-
Size
1KB
-
Sample
221117-tqbb3aeh55
-
MD5
f115333f8c6d19a22743ad549019db28
-
SHA1
e00bbf362c53f58af8b66dedbd44e84a46c97411
-
SHA256
48d585ca3a477ef7e8f0983735903335d9a5327f5fc434c222b6f551f7c0dc68
-
SHA512
ff7e372b39c7829e6303eaa642a3b36a45f5eeadfcb832bd692a0b14c5d67b108161c0826d8d475a8c6d595f5199e95e39d697d245a90e486ff191b369d7c90a
Static task
static1
Behavioral task
behavioral1
Sample
AcrobatInstaller.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
AcrobatInstaller.lnk
Resource
win10-20220812-en
Malware Config
Extracted
https://cruds-club.com/AcrobatInstaller.hta
Extracted
bumblebee
1011t1
64.44.135.140:443
103.144.139.150:443
146.70.149.43:443
Targets
-
-
Target
AcrobatInstaller.lnk
-
Size
1KB
-
MD5
f115333f8c6d19a22743ad549019db28
-
SHA1
e00bbf362c53f58af8b66dedbd44e84a46c97411
-
SHA256
48d585ca3a477ef7e8f0983735903335d9a5327f5fc434c222b6f551f7c0dc68
-
SHA512
ff7e372b39c7829e6303eaa642a3b36a45f5eeadfcb832bd692a0b14c5d67b108161c0826d8d475a8c6d595f5199e95e39d697d245a90e486ff191b369d7c90a
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-