General
-
Target
r3.msi
-
Size
6.4MB
-
Sample
230315-lw62xsee9x
-
MD5
6f7e07b84897cccab30594305416d36f
-
SHA1
6d1d531c921a17b36e792e2843311e27b9aa77a4
-
SHA256
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0
-
SHA512
689ba6b48065a9098ef62bc8ed0650fa0b66f403af9dc315a456d514ea61afda7cf67c3786760e4ac49adc8a60f489199e6aae08a59aa4ef8e57e064bce9e892
-
SSDEEP
196608:+kyJofCBPu0rDMQFVOiNRUm0TcrdJgRueb3IR6s8:DymfCBPoYOiPTacBeue7xs8
Static task
static1
Behavioral task
behavioral1
Sample
r3.msi
Resource
win7-20230220-en
Malware Config
Extracted
bumblebee
Extracted
bumblebee
pgchat
45.61.187.225:443
91.206.178.68:443
193.109.120.252:443
Targets
-
-
Target
r3.msi
-
Size
6.4MB
-
MD5
6f7e07b84897cccab30594305416d36f
-
SHA1
6d1d531c921a17b36e792e2843311e27b9aa77a4
-
SHA256
9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0
-
SHA512
689ba6b48065a9098ef62bc8ed0650fa0b66f403af9dc315a456d514ea61afda7cf67c3786760e4ac49adc8a60f489199e6aae08a59aa4ef8e57e064bce9e892
-
SSDEEP
196608:+kyJofCBPu0rDMQFVOiNRUm0TcrdJgRueb3IR6s8:DymfCBPoYOiPTacBeue7xs8
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-