General

  • Target

    10242416985.zip

  • Size

    25.9MB

  • Sample

    230424-e49z8abd3x

  • MD5

    2094501ce9b123f66fb52ce3b37e6ef5

  • SHA1

    1544de56ce5c489cd309147ed4f20d727cdec4c7

  • SHA256

    afcbefa5e2bdd02162d8c3e1461a4fdf8ba2909d20abcb2e59bcd6eae276a7fc

  • SHA512

    45e307b0b8dfe99bb4567b28f068a0dee856215ef899b51be325f1f7273592b365cbde9b2c9f8fd9928b67bf247231cee831c1aec59fdc0d8a1f6957939637f3

  • SSDEEP

    393216:2xNQwKVs0YpZi7Wp8U6Q23EasbBk1n/i+zBsbpLrU7ugdMkPBLaG6XezwbwsdJ:2kw+5Yp38UI3Dsby/vz6BrU7fTPBL5sL

Malware Config

Extracted

Family

bumblebee

Botnet

zoo

C2

192.198.82.51:443

142.11.194.198:443

89.44.9.204:443

rc4.plain

Targets

    • Target

      e10dbd4a903b0fa82db9794df6496afe17c98a166253d425f3535959110909a3

    • Size

      25.9MB

    • MD5

      711482ca4d5dcaf0aec4c7c4b3e1bef1

    • SHA1

      77b9050f2b974bc67996b6435520b557a6ad1303

    • SHA256

      e10dbd4a903b0fa82db9794df6496afe17c98a166253d425f3535959110909a3

    • SHA512

      face1dba9ba688e5ff8e0e4f490a6183c444e814e6222c92a1bb138d88375a7036341081e77f31299c2f57d9283706bb0da58b701403fe590edb676b2f421c88

    • SSDEEP

      786432:sQrpQ/w8q9m0xGPhXvN202sgPk3W2XhykV:sQr2/l0MZ/NBUk3HXUC

    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks