General
-
Target
file.exe
-
Size
2.9MB
-
Sample
230516-ny1c9saf45
-
MD5
ad60c039352b7cc14e2d9e20658b4f55
-
SHA1
27f06407aec208e505a375a5240790b1b0209b96
-
SHA256
e7e6d5bbce9634227bfd03d13847dfe1a574663eeeb238307afb6cf71a105afc
-
SHA512
883fd62d65ead14aaa50398cedb96b9fdcf727b3de5c8fb73c1997568fc10fe5a4df52df2d655504aa95d5633fa7cf8d23f1a392c16f73f2c3a92faf04c2c30a
-
SSDEEP
49152:nRRivn9urgLOOYRFjyohx6/sAYowbyrlzNToB+5qrohaF+OaElRsSMlN:RAu8LHkFjy8oUAYYViB+57aFboD
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
lumma
195.123.227.138
Targets
-
-
Target
file.exe
-
Size
2.9MB
-
MD5
ad60c039352b7cc14e2d9e20658b4f55
-
SHA1
27f06407aec208e505a375a5240790b1b0209b96
-
SHA256
e7e6d5bbce9634227bfd03d13847dfe1a574663eeeb238307afb6cf71a105afc
-
SHA512
883fd62d65ead14aaa50398cedb96b9fdcf727b3de5c8fb73c1997568fc10fe5a4df52df2d655504aa95d5633fa7cf8d23f1a392c16f73f2c3a92faf04c2c30a
-
SSDEEP
49152:nRRivn9urgLOOYRFjyohx6/sAYowbyrlzNToB+5qrohaF+OaElRsSMlN:RAu8LHkFjy8oUAYYViB+57aFboD
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-