

Rewterz Threat Alert – Raccoon Infostealer – Active IOCs
June 24, 2022
Rewterz Threat Alert – APT SideWinder Group – Active IOCs
June 24, 2022
Rewterz Threat Alert – Raccoon Infostealer – Active IOCs
June 24, 2022
Rewterz Threat Alert – APT SideWinder Group – Active IOCs
June 24, 2022Severity
Medium
Analysis Summary
The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader backdoor, which is previously used to transmit ransomware payloads. According to researchers, the appearance of Bumblebee in phishing attempts in March correlates with a drop in the use of BazarLoader for distributing file-encrypting malware.
Bumblebee is distributed in the form of ISO files that contain malicious DLL and shortcut files. It employs different techniques to avoid detection. It can determine virtualization environment processes to prevent operating on virtual machines. Banking information, password, and identity theft are the main impact of this malware.
Bumblebee malware is designed to download and run additional payloads in order to infect computers with other malware. Bumblebee can be used to inject information stealers, cryptocurrency miners, and other malware since it is designed to drop extra payloads. The C2 (Command and Control) server is where Bumblebee gets commands. It is used by the attackers to download and execute files directly, inject malicious DLLs, and create operating system persistence.
This malware is distributed via phishing emails in the form of an ISO file, which contains a shortcut and a malicious DLL file. According to researchers Bumblebee was recently distributed to Korean users via email hijacking in certain situations.

Impact
- Credential Theft
- Financial Loss
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 0d0147105753b8c236715b407a55c225
- 24dec0a814f3d8af4de0cedcbcc4bcd3
- 7c5aca79596e25ef0701016ccd4c30bf
- 16da4284ab7ab9d5669c34c339132ed6
- 557392dd676ff78699434c914459833f
SHA-256
- a12591bedc078da942a1b0a80c28cde3430cbdeb4af924f821a70b6b762f77f7
- e31d2240282b5657abe10bd2dcdf723f027f889abaef4458f259d6182d03d51d
- 97e54db8248a55d8784f91bf722c02cc0a034fdb18d9cab870bb9698367ed0cd
- 1249075a0c4af8ecfeb4a3ab1e9ef692cb8876591d73f3470106402ab1592717
- 02cbcd301bc8ecf00de4f70e22a39f84ce02a527fee759c336427dc68f0d9491
SHA-1
- 1c6533ffb86c4666bfbf009704960b2e926a8995
- 9b3a7744215d888b62018b73760ea3e195b4a5d8
- 5d859139203f8529bbd00c63b5298cdccd746aa6
- 34dc625fc243d06cbc33d403ac7ee05edfd32819
- 1ea9569f325988ee39ee909c39333e963373ca93
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.