{"id":2045,"date":"2024-09-25T11:03:56","date_gmt":"2024-09-25T11:03:56","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2045"},"modified":"2025-07-29T03:16:41","modified_gmt":"2025-07-29T03:16:41","slug":"bumblebee-loader-analysis","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/bumblebee-loader-analysis\/","title":{"rendered":"BumbleBee Loader Analysis"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"735\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bbee-featured-img-1024x735.webp\" alt=\"bbee-featured-img\" class=\"wp-image-2046\"\/><figcaption class=\"wp-element-caption\">CPP Code in Chinese &#8211; Exotic Lily<\/figcaption><\/figure>\n\n\n\n<p>The trojan called Bumblebee was created in C++ with the intention of attacking the Windows OS. It has the ability to collect system data, persist itself post&nbsp;execution, communicate with a C2 server, and receive and activate&nbsp;payloads like shellcode and DLLs which combines a lot of hooking and unhooking calls.&nbsp;<\/p>\n\n\n\n<p>BumbleBee malware uses the DLLs&nbsp;to execute or inject payloads into a process from a hardcoded list after saving them to disc. Data structured as JSON and encrypted using RC4 is sent back and forth between C2 Server&nbsp;over HTTPS protocol. Additionally, a binary comparison of the code between Bumblebee and the Ramnit virus showed that there was a substantial degree of code commonality.<\/p>\n\n\n\n<p>Bumblebee Trojan which is mainly distributed via phishing and spam emails, it is the replacement for Bazar-Loader malware. It delivers known attack frameworks and open-source tools such as Cobalt Strike, Shellcode, Sliver, Meterpreter, etc. Usually, \u2018.EML\u2019 contains an \u2018.iso\u2019 file &#8211; an archive file format to deliver the payload files such as [.LNK &amp; .EXE or .DLL].<\/p>\n\n\n\n<p><strong>Infection Chain<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"268\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb1_infection_chain-1024x268-1.webp\" alt=\"\" class=\"wp-image-2047\"\/><\/figure>\n\n\n\n<p>Recently, the Bumblebee campaign infected its victims by initial infection vectors of spam emails. The phishing email attachment contains the .ISO file. This image contains the payload file to infect the targeted victim machines. LMNTRIX CDC has been tracking another fresh infection chain that employs the PowerSploit framework for covert reflective injection of a DLL payload into memory; we have been tracking this sample in a fresh iteration of the Bumblebee malware loader.<\/p>\n\n\n\n<p>As usual, the initial vectors may vary depending on their targets and we all know that the threat actors perform basic reconnaissance methodologies to decide their infection vector.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Sample Information<\/strong><\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"467\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb2_sampleinfo-1024x467-1.webp\" alt=\"\" class=\"wp-image-2048\"\/><\/figure>\n\n\n\n<p><strong>Technical Analysis of Bumblebee<\/strong><\/p>\n\n\n\n<p>Bumblebee\u2019s code contains a single function that handles the initialization, deployment, response handling, and sending requests. Once the malware is launched on a compromised device, it gathers the victim\u2019s information, then it communicates to the C2 server. Basically, this malware is used to fetch and run additional malicious payloads, such as Cobalt Strike, Sliver, and Meterpreter.<\/p>\n\n\n\n<p>It\u2019s compiled in Microsoft Visual C++, screenshot attached below,<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb3_strings_info-1024x577-1.webp\" alt=\"\" class=\"wp-image-2049\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb4_cdecl_screen-1024x582-1.webp\" alt=\"\" class=\"wp-image-2050\"\/><\/figure>\n\n\n\n<p><strong><strong>Phishing Email containing the .ISO File<\/strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"476\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb5_phish_iso-1024x476-1.webp\" alt=\"\" class=\"wp-image-2051\"\/><\/figure>\n\n\n\n<p><strong>Why are ISO files being used?<\/strong><\/p>\n\n\n\n<p>ISO files are used to store file system copies of optical discs as a disc image format, but they essentially operate as an archive file format similar to zip, rar and cab formats. Also, malware authors know that many e-mail gateway scanners don\u2019t scan ISO file attachments properly. This is because ISOs tend to be hundreds of megabytes in size, making them largely inefficient for the scanner to parse. It\u2019s an effective method to evade security controls. However, ISOs can also be very small and may contain nothing more than a half megabyte malware binary. Now-a-days ISO files are very easy to open. This increases the chances of the target opening the file and infecting their victim machines.<\/p>\n\n\n\n<p><strong>Manual Extraction of ISO file<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"478\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb6_manual_extract-1024x478-1.webp\" alt=\"\" class=\"wp-image-2052\"\/><\/figure>\n\n\n\n<p><strong>How does BumbleBee loader work?<\/strong><\/p>\n\n\n\n<p>Bumblebee contains a small malicious program whose goal is to download and execute additional payloads on compromised machines without detection. To achieve this, they use various techniques to inject or attach these payloads to existing legitimate processes. They also collect system information about the compromised computer that can later be used to uniquely identify the victim machine in the attackers&#8217; command-and-control panel.<\/p>\n\n\n\n<p><strong>Script Files<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"276\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image.webp\" alt=\"\" class=\"wp-image-2057\"\/><\/figure>\n\n\n\n<p>From the above-mentioned snap, the infection flow is very simple. Initially, the .LNK shortcut file triggers the .VBS script. Using a shell command, the .VBS script file executes the .CMD file, then it will call the {XXXXX.DAT} file. It\u2019s the final payload file in .DLL format.<\/p>\n\n\n\n<p><br><strong>Analysis of .DLL payload file:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb8_analysis_dll-1024x559-1.webp\" alt=\"\" class=\"wp-image-2053\"\/><\/figure>\n\n\n\n<p><strong>Imports &amp; Export functions<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"639\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb9_impexp1-1024x639-1.webp\" alt=\"\" class=\"wp-image-2054\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"302\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb9_impexp2-1024x302-1.webp\" alt=\"\" class=\"wp-image-2055\"\/><\/figure>\n\n\n\n<p>Calls to ExitProcess, IsDebuggerPresent, RegisterShellHookWindow represent anti-debugging and anti-VM checks in bumblebee\u2019s malicious code.<\/p>\n\n\n\n<p><strong>Process Tree<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"500\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/bb10_process_tree-1024x500-1.webp\" alt=\"\" class=\"wp-image-2056\"\/><\/figure>\n\n\n\n<p>Here, we can see by using the <strong>runprXX export function<\/strong> to run the payload file, Once executed successfully then the infection starts. Every malware used to identify the virtual environment, likewise Bumblebee performs the following actions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Queries registry keys related to Virtual Machine-related software.<\/li>\n\n\n\n<li>Executes WMI queries to identify them.<\/li>\n\n\n\n<li>Identifies emulator by reading the respective registry keys.<\/li>\n\n\n\n<li>Identify the window name of the running process.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Indicators of Compromise for BumbleBee malware<\/strong><\/h3>\n\n\n\n<p><strong>BumbleBee Files<\/strong><\/p>\n\n\n\n<p>container.vhd (SHA256)&nbsp;&nbsp;&nbsp;&nbsp; 91d29cfe549d8c7ade35f681ea60ce73a48e00c2f6d55a608f86b6f17f494d0d<\/p>\n\n\n\n<p>Quote.lnk (SHA256)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 940182dd2eaf42327457d249f781274b07e7978b62dca0ae4077b438a8e13937<\/p>\n\n\n\n<p>quotefile.ps1 (SHA256)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; d6cc3ac995484b99ed790b6f8ceb145492794eb5d01ec4a71123b9975e9bfd20<\/p>\n\n\n\n<p>stage2.ps1 (SHA256)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5d000af554dcd96efa066301b234265892b8bf37bf134f21184096bdc3d7230b<\/p>\n\n\n\n<p>payload.dll (SHA256)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0b0a5f3592df7b538b8d8db4ba621b03896f27c9f112b88d56761972b03e6e58<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Bumblebee ISO samples<\/strong><\/p>\n\n\n\n<p>9eacade8174f008c48ea57d43068dbce3d91093603db0511467c18252f60de32<\/p>\n\n\n\n<p>6214e19836c0c3c4bc94e23d6391c45ad87fdd890f6cbd3ab078650455c31dc8<\/p>\n\n\n\n<p>201c4d0070552d9dc06b76ee55479fc0a9dfacb6dbec6bbec5265e04644eebc9<\/p>\n\n\n\n<p>1fd5326034792c0f0fb00be77629a10ac9162b2f473f96072397a5d639da45dd<\/p>\n\n\n\n<p>01cc151149b5bf974449b00de08ce7dbf5eca77f55edd00982a959e48d017225<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Bumblebee Samples Analyzed<\/strong><\/p>\n\n\n\n<p>c70413851599bbcd9df3ce34cc356b66d10a5cbb2da97b488c1b68894c60ea69<\/p>\n\n\n\n<p>c78290da99475f965ce54f737e0927a9855e03c9a27f2ee7a797562533779305<\/p>\n\n\n\n<p>14f04302df7fa49d138c876705303d6991083fd84c59e8a618d6933d50905c61<\/p>\n\n\n\n<p>76e4742d9e7f4fd3a74a98c006dfdce23c2f9434e48809d62772acff169c3549<\/p>\n\n\n\n<p>024f8b16ee749c7bb0d76500ab22aa1418cd8256fb12dcbf18ab248acf45947e<\/p>\n\n\n\n<p>2691858396d4993749fec76ac34cf3cc3658ee3d4eaf9c748e2782cfc994849d<\/p>\n\n\n\n<p>6bc2ab410376c1587717b2293f2f3ce47cb341f4c527a729da28ce00adaaa8db<\/p>\n\n\n\n<p>083a4678c635f5d14ac5b6d15675d2b39f947bb9253be34d0ab0db18d3140f96<\/p>\n\n\n\n<p>21df56d1d4b0a6a54bae3aba7fe15d307bac0e3391625cef9b05dd749cf78c0c<\/p>\n\n\n\n<p>31005979dc726ed1ebfe05558f00c841912ca950dccdcdf73fd2ffbae1f2b97f<\/p>\n\n\n\n<p>2d67a6e6e7f95d3649d4740419f596981a149b500503cbc3fcbeb11684e55218<\/p>\n\n\n\n<p>f98898df74fb2b2fad3a2ea2907086397b36ae496ef3f4454bf6b7125fc103b8<\/p>\n\n\n\n<p>3c0f67f71e427b24dc77b3dee60b08bfb19012634465115e1a2e7ee5bef16015<\/p>\n\n\n\n<p>ca9da17b4b24bb5b24cc4274cc7040525092dffdaa5922f4a381e5e21ebf33aa<\/p>\n\n\n\n<p>82aab01a3776e83695437f63dacda88a7e382af65af4af1306b5dbddbf34f9eb<\/p>\n\n\n\n<p>a5bcb48c0d29fbe956236107b074e66ffc61900bc5abfb127087bb1f4928615c<\/p>\n\n\n\n<p>07f277c527d707c6138aae2742939e8edc9f700e68c4f50fd3d17fe799641ea8<\/p>\n\n\n\n<p>68ac44d1a9d77c25a97d2c443435459d757136f0d447bfe79027f7ef23a89fce<\/p>\n\n\n\n<p>13c573cad2740d61e676440657b09033a5bec1e96aa1f404eed62ba819858d78<\/p>\n\n\n\n<p>7024ec02c9670d02462764dcf99b9a66b29907eae5462edb7ae974fe2efeebad<\/p>\n\n\n\n<p>ee27cceac88199bf3546e8b187d77509519d6782a0e114fc9cfc11faa2d33cd1<\/p>\n\n\n\n<p>b2c28cdc4468f65e6fe2f5ef3691fa682057ed51c4347ad6b9672a9e19b5565e<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>BumbleBee Domains<\/strong><\/p>\n\n\n\n<p>al-ghurair[.]us<\/p>\n\n\n\n<p>amevida[.]us<\/p>\n\n\n\n<p>awsblopharma[.]com<\/p>\n\n\n\n<p>avrobio[.]co<\/p>\n\n\n\n<p>brightlnsight[.]co<\/p>\n\n\n\n<p>belcolnd[.]com<\/p>\n\n\n\n<p>craneveyor[.]us<\/p>\n\n\n\n<p>conlfex[.]com<\/p>\n\n\n\n<p>elemblo[.]com<\/p>\n\n\n\n<p>faustel[.]us<\/p>\n\n\n\n<p>kvnational[.]us<\/p>\n\n\n\n<p>lagauge[.]us<\/p>\n\n\n\n<p>lsoplexis[.]com<\/p>\n\n\n\n<p>modernmeadow[.]co<\/p>\n\n\n\n<p>missionbio[.]us<\/p>\n\n\n\n<p>opontia[.]us<\/p>\n\n\n\n<p>prmflltration[.]com<\/p>\n\n\n\n<p>phxmfg[.]co<\/p>\n\n\n\n<p>richllndmetals[.]com<\/p>\n\n\n\n<p>revergy[.]us<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong>Here are some common C2 Server IP addresses we have been tracking,<\/strong><\/p>\n\n\n\n<p>104[.]168[.]201[.]219&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 142[.]11[.]234[.]230&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 145[.]239[.]30[.]26<\/p>\n\n\n\n<p>145[.]239[.]135[.]155&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 145[.]239[.]28[.]110&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 146[.]19[.]173[.]202<\/p>\n\n\n\n<p>146[.]70[.]125[.]122&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 152[.]89[.]247[.]79&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 185[.]17[.]40[.]189<\/p>\n\n\n\n<p>185[.]62[.]58[.]175&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 205[.]185[.]122[.]143&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 205[.]185[.]123[.]137<\/p>\n\n\n\n<p>209[.]141[.]46[.]50&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 209[.]141[.]58[.]141&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]210[.]158[.]156<\/p>\n\n\n\n<p>51[.]68[.]144[.]94&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]68[.]145[.]54&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]68[.]146[.]186<\/p>\n\n\n\n<p>51[.]68[.]147[.]233&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]75[.]62[.]99&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]83[.]250[.]240<\/p>\n\n\n\n<p>51[.]83[.]251[.]245&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]83[.]253[.]131&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 51[.]83[.]253[.]244<\/p>\n\n\n\n<p>54[.]37[.]130[.]166&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 54[.]37[.]131[.]14&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 54[.]38[.]136[.]111<\/p>\n\n\n\n<p>54[.]38[.]136[.]187&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 54[.]38[.]138[.]94&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 54[.]38[.]139[.]20<\/p>\n\n\n\n<p>Note: The number of BumbleBee C2 servers in the wild, continue to increase by the day.<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>MITRE ATT&amp;CK Tools &amp; Techniques Used By BumbleBee<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>ID<\/strong><\/td><td><strong>Tactic<\/strong><\/td><td><strong>Technique<\/strong><\/td><\/tr><tr><td>T1566<br>T1190<\/td><td>Initial Access<\/td><td>Phishing<br>Exploit Public-Facing Application.<\/td><\/tr><tr><td>T1059<\/td><td>Execution<\/td><td>Command and Scripting Interpreter<\/td><\/tr><tr><td>T1497<\/td><td>Defense Evasion<\/td><td>Virtualization\/Sandbox Evasion Check<\/td><\/tr><tr><td>T1053<\/td><td>Persistence<\/td><td>Scheduled Task<\/td><\/tr><tr><td>T1012<br>T1082<\/td><td>Discovery<\/td><td>Query Registry<br>System Information Discovery<\/td><\/tr><tr><td>T1552<\/td><td>Credential Access<\/td><td>Unsecured Credentials<\/td><\/tr><tr><td>T1021<\/td><td>Lateral Movement<\/td><td>Remote Services<\/td><\/tr><tr><td>T1496<\/td><td>Impact<\/td><td>Resource Hijacking<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The trojan called Bumblebee was created in C++ with the intention of attacking the Windows OS. It has the ability to collect system data, persist itself post&nbsp;execution, communicate with a C2 server, and receive and activate&nbsp;payloads like shellcode and DLLs which combines a lot of hooking and unhooking calls.&nbsp; BumbleBee malware uses the DLLs&nbsp;to execute [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2046,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2045"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2045\/revisions"}],"predecessor-version":[{"id":4200,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2045\/revisions\/4200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2046"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}