Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Bumblebee Loader

126
Global rank
69 infographic chevron month
Month rank
78 infographic chevron week
Week rank
0
IOCs

Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.

Loader
Type
Unknown
Origin
1 September, 2021
First seen
20 September, 2025
Last seen

How to analyze Bumblebee Loader with ANY.RUN

Type
Unknown
Origin
1 September, 2021
First seen
20 September, 2025
Last seen

IOCs

IP addresses
183.134.98.217
104.248.96.105
47.183.3.102
101.205.238.209
95.175.89.220
181.179.7.144
59.131.145.163
37.238.195.34
11.133.216.59
154.5.156.81
42.139.96.150
8.98.218.10
150.125.181.52
91.122.18.192
49.207.112.241
136.45.182.236
217.75.208.196
219.117.223.218
131.91.52.252
185.42.186.34
Hashes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axiscamerastation.org
ip-scanner.org
opmanager.pro
ijt0l3i8brit6q.org
2rxyt9urhq0bgj.org
ev2sirbd269o5j.org
angryipscanner.org
ovh1kn1tcqw5kp.org
8doj8uvx604eck.org
kwywztxoo2xdot.org
0youdp14i4r4h5.org
wp67lr8ysypurn.org
1074slp8zafyz3.org
v5rjsdqogstopr.org
vfwlzltibeg7ne.org
ky1d1p1daahe5t.org
011jn31n05qzpp.org
1ge03xy5vtwn5s.org
13ov5ypehzqx5l.org
hpzmehtnkk4q22.org
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 477
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 572
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3857
comments 0

What is Bumblebee malware loader?

The Bumblebee malware loader first emerged in September 2021, and by early 2022, it started becoming more widely used. Cybercriminals who used to rely on a similar malware, called BazarLoader, began switching to Bumblebee because it could handle more complex tasks and was better at getting into systems undetected.

Connected to hacker groups like TrickBot and Conti, Bumblebee quickly became a popular choice for launching ransomware attacks against organizations. It’s designed to sneak into a system, stay hidden, and make it easier for attackers to spread harmful software.

In recent years, Bumblebee has been used in several large-scale attacks. Many of these attacks started with phishing emails that looked like they were from trusted sources, like urgent messages or voicemails, but were actually designed to trick people into downloading infected files from OneDrive links.

Once Bumblebee was in the system, it often deployed other harmful software, such as Cobalt Strike, which could allow attackers to spread ransomware throughout a network.

By analyzing Bumblebee loader samples inside ANY.RUN’s sandbox, we can see how it actually behaves inside an isolated environment.

Bumblebee technique in ANY.RUN sandbox Details of Bumblebee's PowerShell use shown by ANY.RUN’s Interactive Sandbox

For instance, in this analysis session, Bumblebee loader exploits PowerShell to execute malicious activities:

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Bumblebee loader technical details

Bumblebee acts as a loader, meaning its main job is to deploy other types of malicious software into infected systems. It can download and run additional malware, often used to bring in ransomware or other data-stealing programs.

The primary functionalities of Bumblebee loader include:

  • Establishes a connection with a remote server controlled by attackers, allowing them to communicate with the malware and send commands.
  • Uses DLL injection, which allows it to inject itself into legitimate processes and mask its activity.
  • Exploits legitimate system tools, such as PowerShell and Windows Management Instrumentation (WMI), to perform its actions.
  • Employs anti-sandbox and anti-analysis techniques, like checking for virtual environments, which helps it bypass many security tools and avoid being analyzed in controlled settings.
  • Frequently hides its code, using techniques like control-flow obfuscation and encoding its payloads in base64.
  • Uses scripts to load itself through a Visual Basic Script (VBS) scheduled task.

Bumblebee’s developers have given it a flexible command set, allowing attackers to control various aspects of its behavior remotely. This set includes commands for downloading executables (Dex), injecting shellcode (Shi), removing itself (Sdl), and setting up persistent tasks (Ins). This versatility allows attackers to deploy Bumblebee in different environments and adjust its activity based on the specific target or objectives of an attack.

This loader often hides in ISO or VHD (virtual hard disk) files, which are mounted like a disk by Windows systems. These files can carry hidden shortcut files that users may click, unknowingly executing Bumblebee’s payload. This tactic helps it bypass certain email filters and endpoint defenses, as these file formats don’t trigger the same alarms as traditional executable files

Bumblebee’s command-and-control (C2) communication can utilize legitimate services like OneDrive, Google Drive, and DocuSign as intermediary points for downloading payloads. This tactic exploits the trust users have in these services, allowing Bumblebee to blend its communication within normal network traffic and evade detection.

Bumblebee loader execution process

To see how Bumblebee loader operates, let’s upload its sample to the ANY.RUN sandbox.

Bumblebee is primarily distributed through phishing emails containing malicious attachments or links to compromised archives. These emails are often crafted to resemble legitimate communications, enticing users to open them.

The initial payload typically arrives as a ZIP file containing a shortcut file (LNK). When executed, the LNK file runs a PowerShell command that downloads a malicious MSI file from a remote server. This MSI file is frequently disguised as legitimate software updates (e.g., NVIDIA drivers) to avoid detection.

In the following sandbox analysis session, we can see that the installation process uses the msiexec.exe tool with options that allow it to run silently, minimizing user interaction and visibility.

Bumblebee powershell process in ANY.RUN sandbox Bumblebee's PowerShell process identified by ANY.RUN’s Interactive Sandbox

A distinctive feature of Bumblebee is its ability to execute payloads directly in memory without writing them to disk. This is achieved through techniques like reflective DLL injection, enabling it to load and run code within other processes' contexts, effectively bypassing traditional antivirus detection.

Bumblebee also employs obfuscation techniques to mask its operations and evade security measures. For example, PowerShell scripts are often encoded and segmented to complicate analysis and detection.

Bumblebee graph in ANY.RUN sandbox Bumblebee's process graph shown by ANY.RUN’s Interactive Sandbox

Following successful execution, Bumblebee initiates various post-exploitation activities, such as privilege escalation, credential theft, and extensive system reconnaissance. It gathers sensitive information and prepares the environment for additional payloads, which may include ransomware like Quantum Locker or Cobalt Strike beacons.

The malware's configuration data is encrypted using an RC4 key, allowing it to adapt its behavior based on the infiltrated environment.

Bumblebee Loader distribution methods

Here are the main distribution methods of Bumblebee loader:

  • Phishing emails with malicious attachments: Bumblebee is often delivered through phishing campaigns with attachments, such as ISO or VHD files, which are designed to appear as legitimate documents. When users open these attachments, they unknowingly execute the Bumblebee loader.
  • Email thread hijacking: Attackers reply to existing, legitimate email threads with malicious attachments, making the phishing attempt seem more credible. This technique increases the likelihood of recipients trusting and opening the infected files.
  • Macro-enabled documents: Some versions of Bumblebee use Microsoft Office documents with embedded macros. Once opened, these documents prompt users to enable macros, triggering the download and execution of Bumblebee payloads.
  • Social engineering with trusted services: Bumblebee uses common file-sharing services to bypass basic security measures and gain entry into targeted systems, blending in with legitimate business communications.

Gathering Threat Intelligence on Bumblebee Loader Malware

To collect the latest intelligence on Bumblebee malware, consider using Threat Intelligence Lookup on ANY.RUN. This tool connects you to a vast database with insights from millions of malware analysis sessions run in the ANY.RUN sandbox, offering in-depth details on various threats.

Bumblebee Lookup results in ANY.RUN sandbox Threat intelligence on Bumblebee Loader displayed by ANY.RUN’s TI Lookup

With over 40 customizable search filters, you can find specific data on Bumblebee, including indicators like IP addresses, domains, file names, and process traces. Simply enter a query such as threatName:"Bumblebee" AND domainName:"" to retrieve all related samples, sandbox results, and associated artifacts.

Try a 14-day free trial of Threat Intelligence Lookup along with the ANY.RUN sandbox to start gathering insights on Bumblebee.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Bumblebee loader is highly dangerous due to its stealth, payload delivery capabilities, and resilience, making it a serious threat for organizations. Using proactive tools like ANY.RUN is crucial to safely analyze suspicious files and URLs in real time and catch potential threats early.

ANY.RUN offers an interactive analysis platform where users can observe malware behaviors in a sandbox, supporting a range of OS environments and providing advanced threat detection features.

Get started with ANY.RUN today—sign up for a free account and analyze unlimited malware.

HAVE A LOOK AT

FatalRAT screenshot
FatalRAT
fatalrat
FatalRAT is a malware that gives hackers remote access and control of the system and lets them steal sensitive information like login credentials and financial data. FatalRAT has been associated with cyber espionage campaigns, particularly targeting organizations in the Asia-Pacific (APAC) region.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
Arechclient2 screenshot
Arechclient2
arechclient2
The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.
Read More
DarkComet screenshot
DarkComet
darkcomet rat darkcomet rat
DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.
Read More
Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More