General
-
Target
IN(11)-9-12-2023_639663.zip
-
Size
944B
-
Sample
230914-jpq11sad8t
-
MD5
172c72917a13d0aa555fcc33d069cdc5
-
SHA1
47d321e5597925b355807fd58b13f5ef33900c51
-
SHA256
2275925934f19490d0a053d03395ea3480fb4a21fbbd48facb233c6b839d063d
-
SHA512
a9378711bc964e907f1fe62d4bc07c1f9e492c0866a4ad5830c9c1fd5265594fe5fbf3d1d1977afa99443a5770ce61a3f8a4c80bb83be087c3776afd8ef7f238
Static task
static1
Behavioral task
behavioral1
Sample
IN(11)-9-12-2023_639663.vbs
Resource
win7-20230831-en
Malware Config
Extracted
bumblebee
js1
Targets
-
-
Target
IN(11)-9-12-2023_639663.vbs
-
Size
1KB
-
MD5
8cd1c23782729f7b13e3132032059e51
-
SHA1
7a32b8a787374840daeea67c1961085546820cb5
-
SHA256
b820d64062d79bda89ff168acff318a14a4a0e8a06b69b074452e738ba6d485c
-
SHA512
b7b95148b05713a80ba72b2e1343f12f713734280d54bc69cb1c653710bfad708459c8a9e102d2446cd38e220caff51b634bc012459df57294282e888677de17
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtCreateThreadExHideFromDebugger
-