General

  • Target

    9612695820.zip

  • Size

    6.4MB

  • Sample

    230319-2tvh4scf2x

  • MD5

    ebfeaaecea718d9eca1f0e928a814235

  • SHA1

    9721cb1854b7f2fab0329d8bd0e3dce79a9e70e0

  • SHA256

    6ca37dde5f16f43659886b569cc22b4718ff1430db32b9e1a9687e495bd908f4

  • SHA512

    e417520cc4ed11898f423d5bcf12ad6e79ae58b5792f6b206c8fde418249cb56330693a1b5bd28382e677e9514219d3d13df8b08a3c9bf58100373ae46692493

  • SSDEEP

    196608:Z5Z437wPcFTMqFtRWLPKEB9621pGru3j1d6QEE:ZM37wGIysPKW9BJF

Malware Config

Extracted

Family

bumblebee

rc4.plain

Extracted

Family

bumblebee

Botnet

pgchat

C2

45.61.187.225:443

91.206.178.68:443

193.109.120.252:443

rc4.plain

Targets

    • Target

      9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0

    • Size

      6.4MB

    • MD5

      6f7e07b84897cccab30594305416d36f

    • SHA1

      6d1d531c921a17b36e792e2843311e27b9aa77a4

    • SHA256

      9982330ae990386cd74625f0eaa26ae697574694eb2ec330c2acac5e0149fdc0

    • SHA512

      689ba6b48065a9098ef62bc8ed0650fa0b66f403af9dc315a456d514ea61afda7cf67c3786760e4ac49adc8a60f489199e6aae08a59aa4ef8e57e064bce9e892

    • SSDEEP

      196608:+kyJofCBPu0rDMQFVOiNRUm0TcrdJgRueb3IR6s8:DymfCBPoYOiPTacBeue7xs8

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks