General

  • Target

    CojcsWGNGl.exe

  • Size

    6.0MB

  • Sample

    240404-3wwdvsea8s

  • MD5

    bb3cef2577d61f6db132ea9127687653

  • SHA1

    23744c6489204c1c12a7db9f11736826df8612fc

  • SHA256

    82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5

  • SHA512

    700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2

  • SSDEEP

    49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9

Malware Config

Extracted

Family

bumblebee

Botnet

proc_123

rc4.plain

Targets

    • Target

      CojcsWGNGl.exe

    • Size

      6.0MB

    • MD5

      bb3cef2577d61f6db132ea9127687653

    • SHA1

      23744c6489204c1c12a7db9f11736826df8612fc

    • SHA256

      82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5

    • SHA512

      700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2

    • SSDEEP

      49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9

    • BumbleBee

      BumbleBee is a loader malware written in C++.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks