MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BumbleBee


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2
SHA3-384 hash: e6b71543eb9239251ea643f5b022aa920f5ee5b1d8137cb81aaeac5beb44c4c6e896739920373bd5cb80749c50ff5614
SHA1 hash: a13903e50408e11996159fba5f7deab1e73e8f08
MD5 hash: c9216484a6371b055705ec5f4098ab01
humanhash: johnny-wolfram-island-sad
File name:information.dll
Download: download sample
Signature BumbleBee
File size:2'057'728 bytes
First seen:2022-06-16 16:11:22 UTC
Last seen:2022-06-16 16:34:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2dbfb26b6271bc1a04b3433a1c554f18 (1 x BumbleBee)
ssdeep 49152:G+MhMvcxBbQLsks2EWZs09Xl3ZF9EK99sq+Zy1RDZ5ko4Ebv5g7H11zLG0ZriPkb:G+Yu/ZTjLHS3bmdeQbzWIu78ph13l3bS
TLSH T1729528DD923656CFEC1767971DC43E950CD2446B8F164EE854BE2208CA363F836A42AF
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter Rony
Tags:BUMBLEBEE exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
296
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CPUID_Instruction
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BumbleBee
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Contain functionality to detect virtual machines
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Searches for specific processes (likely to inject)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected BumbleBee
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Bumbleloader
Status:
Malicious
First seen:
2022-06-15 13:45:26 UTC
File Type:
PE+ (Dll)
Extracted files:
1
AV detection:
13 of 26 (50.00%)
Threat level:
  5/5
Result
Malware family:
bumblebee
Score:
  10/10
Tags:
family:bumblebee botnet:146l evasion trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Checks BIOS information in registry
Identifies Wine through registry keys
Enumerates VirtualBox registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Looks for VirtualBox Guest Additions in registry
BumbleBee
Malware Config
C2 Extraction:
242.165.212.79:339
162.144.249.150:239
63.122.120.151:268
144.52.138.51:193
18.215.29.142:436
115.239.67.202:380
255.11.235.99:426
213.203.201.199:307
143.117.20.123:425
141.98.168.70:443
174.150.214.40:426
133.133.249.24:204
126.68.7.249:422
103.175.16.107:443
146.70.124.77:443
154.56.0.100:443
180.184.129.160:223
28.78.74.145:427
108.28.254.44:399
115.103.22.1:153
149.57.112.159:122
229.139.73.188:287
112.110.146.153:349
249.222.51.70:286
180.23.251.29:230
244.234.60.83:386
79.133.212.60:211
192.21.12.118:231
31.215.170.180:431
140.208.107.161:360
119.177.224.146:124
58.10.55.201:382
57.156.134.113:446
83.142.26.147:465
194.135.33.16:443
35.17.203.69:268
104.135.8.250:417
210.251.188.194:228
53.96.32.99:333
70.77.209.88:224
65.254.82.66:498
65.95.20.151:232
165.158.204.41:469
185.62.58.209:443
102.109.16.255:445
137.253.55.69:235
Unpacked files
SH256 hash:
fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2
MD5 hash:
c9216484a6371b055705ec5f4098ab01
SHA1 hash:
a13903e50408e11996159fba5f7deab1e73e8f08
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BumbleBeeLoader
Author:enzo & kevoreilly
Description:BumbleBee Loader
Rule name:crime_win64_bumbleebee_loader_packed
Author:Rony (@r0ny_123)
Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BumbleBee

Executable exe fed9bc8df9141f8f8f7a9203bc26b5b22123c154702fcd625379f2f7ecd31cb2

(this sample)

Comments