General

  • Target

    53b3ebaa3c485772f8e6abaa0f366ef192137496a7064e015ced4e6fc204b3c8

  • Size

    2.2MB

  • Sample

    240410-m3pa5agc81

  • MD5

    54c0ae8530a79b79d62877e7527e236f

  • SHA1

    ac6dff8d2277ad03618e9a464a7b3bb01674ddcd

  • SHA256

    53b3ebaa3c485772f8e6abaa0f366ef192137496a7064e015ced4e6fc204b3c8

  • SHA512

    93334b7b32ef9abe3b1a43e07bcdad912d186355800eb9d559a4e3239db493c69e6ee1cf1d2a85958febe9c50e40acc0a31c352a273e9bee96ffdd3e26c3b6cf

  • SSDEEP

    49152:IygszOLIrd+CJawonIPOfKvGRMOKIIIMvqPGsYP:LOFIP3GRh7Mv1ss

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

VPS1GROUP

C2

23.82.19.208:443

Targets

    • Target

      53b3ebaa3c485772f8e6abaa0f366ef192137496a7064e015ced4e6fc204b3c8

    • Size

      2.2MB

    • MD5

      54c0ae8530a79b79d62877e7527e236f

    • SHA1

      ac6dff8d2277ad03618e9a464a7b3bb01674ddcd

    • SHA256

      53b3ebaa3c485772f8e6abaa0f366ef192137496a7064e015ced4e6fc204b3c8

    • SHA512

      93334b7b32ef9abe3b1a43e07bcdad912d186355800eb9d559a4e3239db493c69e6ee1cf1d2a85958febe9c50e40acc0a31c352a273e9bee96ffdd3e26c3b6cf

    • SSDEEP

      49152:IygszOLIrd+CJawonIPOfKvGRMOKIIIMvqPGsYP:LOFIP3GRh7Mv1ss

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks