Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/02/2025, 11:33

250210-nn9h7azjgr 6

10/02/2025, 10:58

250210-m2xacayngp 10

05/02/2025, 03:33

250205-d4n73sypdj 6

General

  • Target

    31b72e1c246b4f38e70f9c8c556a626b15736589860f3231001bb4ebae749239.msi

  • Size

    8.2MB

  • Sample

    250210-m2xacayngp

  • MD5

    2df80283a8c95b24b9c057bc8274c14b

  • SHA1

    ed61db573ef82b42d519aefff15ee157054ed158

  • SHA256

    31b72e1c246b4f38e70f9c8c556a626b15736589860f3231001bb4ebae749239

  • SHA512

    03193a2986bf6f5c3bd6dc38e4b47bf5d7070f45fe1dfa8c54158abf3366a28afa45c1bf9039798a9a350f848f7d6eb58b6c656b88b0be8a08190ff4bf5cd67f

  • SSDEEP

    196608:qYArVsCUdqt33xvKkkar0JxzvoMjsLrYu7KDxn:qYgVsCb3VbozvmYsKV

Malware Config

Extracted

Family

bumblebee

Botnet

9090

Attributes
  • dga

    nvg55tpgvn.click

    ulbun31qmv.click

    7oc6be5fmy.click

    bm76b9296k.click

    h7xupkk0d3.click

    fi7anseaj7.click

    0u4bcayb8u.click

    1cckgd13z5.click

    562z75s3bp.click

    1smmlbbiqr.click

    cc5fi2q6ca.click

    xisdha07tt.click

    rvi6iv6l5v.click

    kddpj0gryr.click

    jmpxjjqhe8.click

    ui1b0rvu0k.click

    kqiqovthoj.click

    zbldvupsdc.click

    qdhqoj9s20.click

    g841i9ksgn.click

    uu4cx79e90.click

    m9a2qfmqay.click

    kc8svtokry.click

    st9rdv9xai.click

    i4965hr9jc.click

    wkxfgjwonu.click

    53y5nwsc6j.click

    7ou7og586r.click

    r5wrzrk1bi.click

    am7gd0loc1.click

  • dga_seed

    -5372979216912523469

  • domain_length

    10

  • num_dga_domains

    300

  • port

    443

  • tld

    .click

rc4.plain

Targets

    • Target

      31b72e1c246b4f38e70f9c8c556a626b15736589860f3231001bb4ebae749239.msi

    • Size

      8.2MB

    • MD5

      2df80283a8c95b24b9c057bc8274c14b

    • SHA1

      ed61db573ef82b42d519aefff15ee157054ed158

    • SHA256

      31b72e1c246b4f38e70f9c8c556a626b15736589860f3231001bb4ebae749239

    • SHA512

      03193a2986bf6f5c3bd6dc38e4b47bf5d7070f45fe1dfa8c54158abf3366a28afa45c1bf9039798a9a350f848f7d6eb58b6c656b88b0be8a08190ff4bf5cd67f

    • SSDEEP

      196608:qYArVsCUdqt33xvKkkar0JxzvoMjsLrYu7KDxn:qYgVsCb3VbozvmYsKV

    • BumbleBee

      BumbleBee is a loader malware written in C++.

    • Bumblebee family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks