Rewterz
Rewterz Threat Alert – IcedID banking Trojan – Active IOCs
September 8, 2022
Rewterz
Rewterz Threat Alert – Hive Ransomware – Active IOCs
September 8, 2022

Rewterz Threat Alert – BumbleBee Malware – Active IOCs

Severity

Medium

Analysis Summary

The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader backdoor, which is previously used to transmit ransomware payloads. This new malware is linked to a number of threat actors, including several well-known ransomware.

According to researchers, the appearance of Bumblebee in phishing attempts in March correlates with a drop in the use of BazarLoader for distributing file-encrypting malware.
Bumblebee is distributed in the form of ISO files that contain malicious DLL and shortcut files. It employs different techniques to avoid detection. It can determine virtualization environment processes to prevent operating on virtual machines. Banking information, password, and identity theft are the main impact of this malware. 
Bumblebee malware is designed to download and run additional payloads in order to infect computers with other malware. Bumblebee can be used to inject information stealers, cryptocurrency miners, and other malware since it is designed to drop extra payloads. The C2 (Command and Control) server is where Bumblebee gets commands. It is used by the attackers to download and execute files directly, inject malicious DLLs, and create operating system persistence.This new malware is linked to a number of threat actors, including several well-known ransomware.

Impact

  • Credential Theft
  • Financial Loss
  • Exposure of Sensitive Data

Indicators of Compromise

MD5

  • d5d3fd317f4980de76cb8a149a049b07
  • a2a55bdae16915aea3bc1933b04eb5e1

SHA-256

  • a896dcc08e5ade583fd9c579c75e3e1b1249e7a873e37ca4a7c11ef363fa8cff
  • 6b3a8f1b3ee2f33912815aa18ed89184ffcc0ddf8619b7551aba216e20e1fe88

SHA-1

  • 935ec3f3720f0b6a88074de6cf99996cb040d789
  • 83e2082f4b30e6475fdf0eeb435f7ef8500363a4

Remediation

  • Block the threat indicators at their respective controls.
  • Search for IOCs in your environment.