General
-
Target
91d29cfe549d8c7ade35f681ea60ce73a48e00c2f6d55a608f86b6f17f494d0d.zip
-
Size
890KB
-
Sample
230306-gk1zbaad5w
-
MD5
611591e83d7cf5229c324b93393db49a
-
SHA1
1827f19859af0586ac16e44f6942e86b58ba12d7
-
SHA256
9086c173ad998545a39547935579ab6ee7a8db5e13d04643a8ca558fd67805dc
-
SHA512
4e3fffaacb5612ca58f339fd818aa79cf4d18094405caf210ddbf4443e97b221e3ba8de68448cc72c33315768d7a9c25346c40113573504d615a4847f695fc0a
-
SSDEEP
24576:Gsi/k6u08c2BN9Wg9sScExi+AWjTtCbjGxX0IH:8fUZ9sS9xipWVUjGt06
Static task
static1
Behavioral task
behavioral1
Sample
Quote.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quote.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
quotefile.ps1
Resource
win7-20230220-en
Malware Config
Extracted
bumblebee
Extracted
bumblebee
1508
172.93.201.138:443
116.142.140.251:443
Targets
-
-
Target
Quote.lnk
-
Size
1KB
-
MD5
4166dc23c9ffb1fe465288801da97ca9
-
SHA1
0e7319378d7cb33f123cd804630c7644384e8931
-
SHA256
940182dd2eaf42327457d249f781274b07e7978b62dca0ae4077b438a8e13937
-
SHA512
60d65cd412938bb55cd268ac81ba05e90790a12755b1d2bcdc351339dac88339b6851e1272716cb3dc3652900226b098b2c3b9b137bcc820510b65f36cb03aff
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
-
-
Target
quotefile.ps1
-
Size
1.9MB
-
MD5
739eaf406607fa3efddb9c6c97cdba76
-
SHA1
bdb0575775a3447391b9d719e6d69c0e44549fd2
-
SHA256
d6cc3ac995484b99ed790b6f8ceb145492794eb5d01ec4a71123b9975e9bfd20
-
SHA512
80ccebc7f4ff3597031899973817acdb4c1638788aa37b536fcafb6cd03b2f6113d40527b2e7a7f49d4794f021c815f8dc85ac4fd372d40cde59da6db2769384
-
SSDEEP
24576:AzrIw+80AssR3D6UN6hzwbSVsi5MW94d5upIAMoIKAdqQb16:AwwahXsvWK1dj6
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-