General
-
Target
10242416985.zip
-
Size
25.9MB
-
Sample
230424-e49z8abd3x
-
MD5
2094501ce9b123f66fb52ce3b37e6ef5
-
SHA1
1544de56ce5c489cd309147ed4f20d727cdec4c7
-
SHA256
afcbefa5e2bdd02162d8c3e1461a4fdf8ba2909d20abcb2e59bcd6eae276a7fc
-
SHA512
45e307b0b8dfe99bb4567b28f068a0dee856215ef899b51be325f1f7273592b365cbde9b2c9f8fd9928b67bf247231cee831c1aec59fdc0d8a1f6957939637f3
-
SSDEEP
393216:2xNQwKVs0YpZi7Wp8U6Q23EasbBk1n/i+zBsbpLrU7ugdMkPBLaG6XezwbwsdJ:2kw+5Yp38UI3Dsby/vz6BrU7fTPBL5sL
Static task
static1
Behavioral task
behavioral1
Sample
e10dbd4a903b0fa82db9794df6496afe17c98a166253d425f3535959110909a3.msi
Resource
win7-20230220-en
Malware Config
Extracted
bumblebee
zoo
192.198.82.51:443
142.11.194.198:443
89.44.9.204:443
Targets
-
-
Target
e10dbd4a903b0fa82db9794df6496afe17c98a166253d425f3535959110909a3
-
Size
25.9MB
-
MD5
711482ca4d5dcaf0aec4c7c4b3e1bef1
-
SHA1
77b9050f2b974bc67996b6435520b557a6ad1303
-
SHA256
e10dbd4a903b0fa82db9794df6496afe17c98a166253d425f3535959110909a3
-
SHA512
face1dba9ba688e5ff8e0e4f490a6183c444e814e6222c92a1bb138d88375a7036341081e77f31299c2f57d9283706bb0da58b701403fe590edb676b2f421c88
-
SSDEEP
786432:sQrpQ/w8q9m0xGPhXvN202sgPk3W2XhykV:sQr2/l0MZ/NBUk3HXUC
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-