General

  • Target

    IN(11)-9-12-2023_639663.zip

  • Size

    944B

  • Sample

    230914-jpq11sad8t

  • MD5

    172c72917a13d0aa555fcc33d069cdc5

  • SHA1

    47d321e5597925b355807fd58b13f5ef33900c51

  • SHA256

    2275925934f19490d0a053d03395ea3480fb4a21fbbd48facb233c6b839d063d

  • SHA512

    a9378711bc964e907f1fe62d4bc07c1f9e492c0866a4ad5830c9c1fd5265594fe5fbf3d1d1977afa99443a5770ce61a3f8a4c80bb83be087c3776afd8ef7f238

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

js1

rc4.plain

Targets

    • Target

      IN(11)-9-12-2023_639663.vbs

    • Size

      1KB

    • MD5

      8cd1c23782729f7b13e3132032059e51

    • SHA1

      7a32b8a787374840daeea67c1961085546820cb5

    • SHA256

      b820d64062d79bda89ff168acff318a14a4a0e8a06b69b074452e738ba6d485c

    • SHA512

      b7b95148b05713a80ba72b2e1343f12f713734280d54bc69cb1c653710bfad708459c8a9e102d2446cd38e220caff51b634bc012459df57294282e888677de17

    Score
    10/10
    • BumbleBee

      BumbleBee is a webshell malware written in C++.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks