Bumblebee – Malware Distributed Through Email Lures and File Sharing
Incident Report for Ascend Security Events
Resolved
Bumblebee – Malware Distributed Through Email Lures and File Sharing

Source: Unit 42 by Palo Alto Networks

Cybersecurity Analysts at Palo Alto have recently shared information regarding the malware “Bumblebee” – a new malware family that has been observed being used by threat actors. Starting in March 2022, threat actors like Projector Libra–who had been distributing BazarLoader–switched to pushing a new malware family called Bumblebee. Security researchers dubbed this malware 'Bumblebee' because it uses “bumblebee” in the user-agent string generated during post-infection HTTPS traffic.

Like most phishing attacks, the infection begins by contacting an end user via email. If a potential victim responds to the initial email, Projector Libra sends a reply stating a separate email has been sent through a file sharing service to provide a file relevant to the discussion. The victim then receives an email generated by the file sharing service. These emails contain a link hosting malware disguised as a file discussed in the previous Projector Libra message.

In the malware sample examined by researchers, the threat actors used a legitimate service "TransferXL". TransferXL is a file-sharing service with a free tier. It is one of many file sharing services with a free pricing category that are frequently abused by criminal groups. These TransferXL URLs expire after one week, which helps conceal the malware from security researchers.

If this file is downloaded and executed, it will begin to contact a Command and Control (C2) server to download additional malicious files and execute commands. Malware distribution patterns reveal Bumblebee continues where BazarLoader left off, which includes pushing follow-up malware like Cobalt Strike that can eventually lead to a ransomware infection.

Indicators of Compromise:
• 58b9a5202a3cc96e86e24cd3c4b797d2efbf7d6b52461eef89b045aa1ff6c6ae
• 9be296fc9b23ad6aed19934123db9c3a2406d544156b7768374e0f9a75eb1549
• a10291506b884327307ae6d97dd6c043e9f2b6283ca3889dc2f5936fb2357862
• c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
• e62b9513784ae339351de089dd356742aa1c95971ad8c0cf126f4e72131df96e
• 024d048f8ce81e8784215dc6cf0e170b02307d9e8624083efdfccaf3e269a0f2
• 54.38.139[.]20
• 45.153.243[.]142

As a result, Ascend Technologies has pushed the detection ability of the known IOCs across our EDR, SIEM, and anti-malware platforms. These IOCs include IPs and hash values which will give us the ability to detect and alert. As is the case with most malware, end users are targeted which makes maintaining a robust security posture highly important, including end-user training, to develop safe and secure internet browsing habits.

Author: Evan Obal

Source: https://unit42.paloaltonetworks.com/bumblebee-malware-projector-libra/
Posted Aug 05, 2022 - 15:24 CDT