MalwareBazaar Database

This page shows some basic information the YARA rule crime_win64_bumblebee_powershell_loader including corresponding malware samples.

Database Entry


YARA Rule:crime_win64_bumblebee_powershell_loader
Author:Rony
Description:Detects a Powershell Loader used to load bumblebee in memory
Firstseen:2022-08-30 18:34:49 UTC
Lastseen:2023-04-04 15:15:33 UTC
Sightings:10

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter