General
-
Target
lIMew1Q9.ylw
-
Size
304B
-
Sample
230507-k4mgtafb31
-
MD5
4d15f28ab76398b3b9db892f23aed6e5
-
SHA1
43011ca0c15f268e4b720a47241a8c8f6e4bd057
-
SHA256
6cd1385131c6f1a0d3e8ec158155a666c1d77319a20c04ca1afa876da5da5d4e
-
SHA512
1af2ab5ae3a6d820d2e523c34bc34ff4a69c0ffc21612cabe08e6bb2b269f4439e073e1bec441817d2280875ce1f7276f2e6eb8f1f17c2d10b40002b4fe65205
Static task
static1
Behavioral task
behavioral1
Sample
lIMew1Q9.js
Resource
win7-20230220-en
Malware Config
Extracted
bumblebee
mc1904
146.70.155.82:443
149.3.170.179:443
103.175.16.150:443
Targets
-
-
Target
lIMew1Q9.ylw
-
Size
304B
-
MD5
4d15f28ab76398b3b9db892f23aed6e5
-
SHA1
43011ca0c15f268e4b720a47241a8c8f6e4bd057
-
SHA256
6cd1385131c6f1a0d3e8ec158155a666c1d77319a20c04ca1afa876da5da5d4e
-
SHA512
1af2ab5ae3a6d820d2e523c34bc34ff4a69c0ffc21612cabe08e6bb2b269f4439e073e1bec441817d2280875ce1f7276f2e6eb8f1f17c2d10b40002b4fe65205
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-