Breaking

New Bumblebee malware has complete stealth and can deploy ransomware

Bumblebee malware is back again this time with a new version that is featuring a infection chain that uses the PowerSploit framework for stealthy reflective injection of a DLL payload into memory.

What is Bumblebee malware?

Bumblebee malware involves phishing campaign that is orchestrated by Bazarloader and TrickBot operators, aka Conti Sydnicate. The malware was first discovered in April. The Bumblebee malware is an evolved loader with exceptional anti-detection and anti-analysis capabilities, it was expected to replace BazarLaodedr to deploy ransomware after the initial compromise.

As per a report by Cyble, the authors of Bumblebee malware are in plans for summer hiatus of spam operation with an updated workflow.

Modus Operandi of Bumblebee Malware

It begins with a phished e-mail that contained a password-protected zipped ISO files with an LNK and a DLL file. The recent attack had Bumblebee replaced its ISO with a VHD and the LNK file.

LNK executes ‘imagedata.ps1’ instead of the DLL using a PowerShell windows and keeps it invisible to the user by exploiting the ‘ShowWindow’ command.

The SP1 script is obfuscated using Base64 and string concatenation to evade antivirus detection while loading the next stage of the PowerShell loader.

The next stage has the same obfuscation initially and then the PowerSploit module to execute the 64-Bit malware into the memory of PowerShell process usign the reflective injection.

“PowerSploit is an open-source post-exploitation framework in which the malware uses a method, Invoke-ReflectivePEInjection, for reflectively loading the DLL into the PowerShell Process.

This method validates the embedded file and performs multiple checks to ensure that the file is loaded properly on the executing system.” as per the Cyble report.

This malware can also load the flow from the memory and never touches the disk, which is why it escapes detection by endpoint security software. With better stealth, Bumblebee malware becomes more dangerous and has the potential of deploying ransomware and other malicious activities on the infected devices.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter. You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago