Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • submitted
    25-11-2024 18:42

General

  • Target

    2cb0aea0f3dfe49b99f5f7a0e6f6020413c916e4a21d05d2df1cca3de3e7e91d.dll

  • Size

    2.3MB

  • MD5

    3cf367e01d074e622e14c36fe1685c0a

  • SHA1

    f9b347b843f438564e606a7d3e273659e0fb7cc7

  • SHA256

    2cb0aea0f3dfe49b99f5f7a0e6f6020413c916e4a21d05d2df1cca3de3e7e91d

  • SHA512

    4033d7e17e673ec67947367fed5f5992d578b61a0da0d24743d03ab0e1bf17f26bce7f80d5b0d23f87736e3d8c429fd4420bec708c295d81d125700bbf4ab3a9

  • SSDEEP

    24576:04MRPjr8C5Gi0v4/bplKYFhoFA496+Se7dwSWt+0zvhsCIA8A3RmzlQ68:2Rfr/bqM2XpWAWJ8MKlQ

Score
10/10

Malware Config

Extracted

Family

bumblebee

Botnet

138704

Attributes
  • dga

    45urhm0ldgxb.live

    gx6xly9rp6vl.live

    zv46ga4ntybq.live

    7n1hfolmrnbl.live

    vivh2xlt9i6q.live

    97t3nh4kk510.live

    kbkdtwucfl40.live

    qk6a1ahb63uz.live

    whko7loy7h5z.live

    dad1zg44n0bn.live

    7xwz4hw8dts9.live

    ovekd5n3gklq.live

    amwnef8mjo4v.live

    e7ivqfhnss0x.live

    rjql4nicl6bg.live

    4mo318kk29i4.live

    zpo18lm8vg1x.live

    jc51pt290y0n.live

    rg26t2dc4hf4.live

    qw9a58vunuja.live

    ugm94zjzl5nl.live

    mckag832orba.live

    pdw0v9voxlxr.live

    m4tx2apfmoxo.live

    n2uc737ef71m.live

    hkk3112645hz.live

    ugko9g5ipa4o.live

    8wgq2x4dybx9.live

    h81fx7sj8srr.live

    a4tgoqi1cm8x.live

  • dga_seed

    7834006444057268685

  • domain_length

    12

  • num_dga_domains

    300

  • port

    443

rc4.plain

Signatures

  • BumbleBee

    BumbleBee is a loader malware written in C++.

  • Bumblebee family
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\2cb0aea0f3dfe49b99f5f7a0e6f6020413c916e4a21d05d2df1cca3de3e7e91d.dll
    1⤵
      PID:5004

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5004-0-0x0000000002DE0000-0x0000000002ED3000-memory.dmp

      Filesize

      972KB

    • memory/5004-1-0x00007FFD547AD000-0x00007FFD547AE000-memory.dmp

      Filesize

      4KB

    • memory/5004-3-0x0000000003100000-0x000000000331E000-memory.dmp

      Filesize

      2.1MB

    • memory/5004-4-0x0000000003100000-0x000000000331E000-memory.dmp

      Filesize

      2.1MB

    • memory/5004-7-0x00007FFD54710000-0x00007FFD54905000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-6-0x00007FFD54710000-0x00007FFD54905000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-5-0x0000000003100000-0x000000000331E000-memory.dmp

      Filesize

      2.1MB

    • memory/5004-2-0x0000000003100000-0x000000000331E000-memory.dmp

      Filesize

      2.1MB

    • memory/5004-8-0x0000000003100000-0x000000000331E000-memory.dmp

      Filesize

      2.1MB

    • memory/5004-17-0x0000000002DE0000-0x0000000002ED3000-memory.dmp

      Filesize

      972KB

    • memory/5004-18-0x00007FFD54710000-0x00007FFD54905000-memory.dmp

      Filesize

      2.0MB

    • memory/5004-19-0x00007FFD547AD000-0x00007FFD547AE000-memory.dmp

      Filesize

      4KB