MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1930bd3a3a2f286f2d8a2920609e145d1fffc2bddebaf1b526a96527a92cf73a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BumbleBee


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 1930bd3a3a2f286f2d8a2920609e145d1fffc2bddebaf1b526a96527a92cf73a
SHA3-384 hash: f8a7db96c4901c01f417f01a63735e151c09dfaa5c41e2bc5af647ca7b7144520ceaf8ca02f5412e652255ff62b5b841
SHA1 hash: 9d46f86dc63da12521919c54a991c031708fef85
MD5 hash: bf6ef3563da6b2719678600d44e00526
humanhash: yankee-bluebird-salami-maryland
File name:plant3.dll
Download: download sample
Signature BumbleBee
File size:3'064'832 bytes
First seen:2022-04-20 16:35:00 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5034976d9d8c12b5605d53a26e90ea3c (1 x BumbleBee)
ssdeep 49152:DkZ0/MSDKocziLDoNkPQ0I7ZF4tkRVCcWp2dj8sRFtYoN3tXxU5DhtNuVwPBRG+4:00/MSDKocziLDoNkPQ0I7ZF4tkRVcp8d
Threatray 2'064 similar samples on MalwareBazaar
TLSH T1BFE5E1E433857A61EAC98B12F148BDE4970130B7F5BB28EC47A71F8619677D8CF24921
TrID 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.3% (.EXE) OS/2 Executable (generic) (2029/13)
18.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.0% (.EXE) DOS Executable Generic (2000/1)
Reporter k3dg3___
Tags:BUMBLEBEE dll exe


Avatar
k3dg3
entry=AUjoZKdcSZ

Intelligence


File Origin
# of uploads :
1
# of downloads :
819
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.Khalesi
Status:
Malicious
First seen:
2022-04-20 16:35:28 UTC
File Type:
PE+ (Dll)
AV detection:
6 of 25 (24.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
Checks BIOS information in registry
Identifies Wine through registry keys
Enumerates VirtualBox registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Looks for VirtualBox Guest Additions in registry
Unpacked files
SH256 hash:
1930bd3a3a2f286f2d8a2920609e145d1fffc2bddebaf1b526a96527a92cf73a
MD5 hash:
bf6ef3563da6b2719678600d44e00526
SHA1 hash:
9d46f86dc63da12521919c54a991c031708fef85
Malware family:
BumbleBee
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

10262bde152b2cef889982aeaaaf2af3029fa7ea923b8643803249f7a3736601

BumbleBee

Executable exe 1930bd3a3a2f286f2d8a2920609e145d1fffc2bddebaf1b526a96527a92cf73a

(this sample)

  
Dropped by
SHA256 10262bde152b2cef889982aeaaaf2af3029fa7ea923b8643803249f7a3736601
  
Delivery method
Distributed via e-mail attachment

Comments