General

  • Target

    c97b8bffcbe424cbc2a6e1135068d071c6f4e8f020fccd2db3dbee3aa80102ac

  • Size

    2.7MB

  • Sample

    240410-rf5rtaae44

  • MD5

    59baede0aac3a38c8578aa8fef89d960

  • SHA1

    19fa63af83dfed8023f10147c33c8edb6aabb1b4

  • SHA256

    c97b8bffcbe424cbc2a6e1135068d071c6f4e8f020fccd2db3dbee3aa80102ac

  • SHA512

    f87e5285a22df54906ee18ba71334beba5dd36cf8cfb3ac8f0f44e8bfe8441ba95e3c6787dc9cb9c274f01aec724500d5d2a3ff3c466f8efdf08bac8b35400ed

  • SSDEEP

    49152:7CkeRD2DBKMpRd8qsToHaQBVeytTEmu6+lzz7JP1KV3jgjO4gYAPLokp6vVkTMU:7CkdB/pRdksaQBVNtTEmu6+lzz7JP1KT

Malware Config

Extracted

Family

bumblebee

Botnet

ALL0604

C2

192.236.198.63:443

Targets

    • Target

      c97b8bffcbe424cbc2a6e1135068d071c6f4e8f020fccd2db3dbee3aa80102ac

    • Size

      2.7MB

    • MD5

      59baede0aac3a38c8578aa8fef89d960

    • SHA1

      19fa63af83dfed8023f10147c33c8edb6aabb1b4

    • SHA256

      c97b8bffcbe424cbc2a6e1135068d071c6f4e8f020fccd2db3dbee3aa80102ac

    • SHA512

      f87e5285a22df54906ee18ba71334beba5dd36cf8cfb3ac8f0f44e8bfe8441ba95e3c6787dc9cb9c274f01aec724500d5d2a3ff3c466f8efdf08bac8b35400ed

    • SSDEEP

      49152:7CkeRD2DBKMpRd8qsToHaQBVeytTEmu6+lzz7JP1KV3jgjO4gYAPLokp6vVkTMU:7CkdB/pRdksaQBVNtTEmu6+lzz7JP1KT

    • BumbleBee

      BumbleBee is a loader malware written in C++.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

MITRE ATT&CK Enterprise v15

Tasks