MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f0fdc0b64b747f348a87a382ff5dfe016107f95ab5953318cc8d9548a983efd1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
BumbleBee
Vendor detections: 11
| SHA256 hash: | f0fdc0b64b747f348a87a382ff5dfe016107f95ab5953318cc8d9548a983efd1 |
|---|---|
| SHA3-384 hash: | 52d511b95f39b44d9dbd84991a9542d75c2357c5ee6a4182a5f6e426aebe2f98df436762c99c99103d99e784d6980121 |
| SHA1 hash: | 0c82220151415e6cbce25d2615d29f4352e0ecd5 |
| MD5 hash: | d7bb608a3b370fa7f457b4e89bbdb594 |
| humanhash: | avocado-kilo-solar-mexico |
| File name: | upload.dll |
| Download: | download sample |
| Signature | BumbleBee |
| File size: | 2'083'840 bytes |
| First seen: | 2022-07-07 17:29:18 UTC |
| Last seen: | 2022-07-07 18:47:29 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 9289cffe7de516dc979bba3057d301c4 (1 x BumbleBee) |
| ssdeep | 49152:E5d89xB7DbdCFudCUJHYf+CkQFqs9Q0TzIThyXajgGdmV/GNtMsJ6HUdBGCLTte9:pDB7DbdCFudCUJHYf+CkQFqs9Q0TzIT2 |
| Threatray | 2'281 similar samples on MalwareBazaar |
| TLSH | T1B3A5B962CB0AF80BDC2C6E7C807F0A4E1194EA081D23B59E1F5A7D5EDA7F643526E1C5 |
| TrID | 48.7% (.EXE) Win64 Executable (generic) (10523/12/4) 23.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 9.3% (.EXE) OS/2 Executable (generic) (2029/13) 9.2% (.EXE) Generic Win/DOS Executable (2002/3) 9.2% (.EXE) DOS Executable Generic (2000/1) |
| Reporter | |
| Tags: | 707a BUMBLEBEE exe |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
171.85.135.192:358
223.7.203.157:407
45.153.242.183:443
211.68.220.197:102
174.119.130.65:369
202.41.22.30:314
58.10.113.168:308
12.33.69.160:285
205.185.123.137:443
112.188.178.13:332
168.205.228.104:480
83.218.135.147:151
228.175.209.140:269
240.114.36.128:411
8.109.227.172:304
142.11.245.185:443
214.233.117.120:167
198.135.200.7:254
73.74.56.146:272
14.42.55.81:416
15.237.42.8:408
159.192.221.167:410
197.26.182.136:279
41.140.44.116:454
161.144.98.94:427
46.208.205.43:235
37.231.14.207:370
183.236.246.8:410
41.232.231.227:382
47.225.45.93:285
162.191.88.20:114
114.170.141.82:227
90.86.27.214:238
117.176.252.35:344
247.184.192.227:394
95.26.242.141:126
75.146.161.164:331
15.14.147.134:401
50.69.254.239:246
69.181.36.251:119
53.34.28.231:447
44.245.217.17:369
237.57.151.39:372
103.175.16.105:443
67.35.182.6:434
146.19.173.31:443
20.189.66.15:257
105.221.27.232:344
88.82.146.11:254
204.63.253.164:476
191.159.75.135:494
214.207.26.205:301
16.182.11.140:166
45.135.162.238:267
Unpacked files
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_win64_bumbleebee_loader_packed |
|---|---|
| Author: | Rony (@r0ny_123) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.