General
-
Target
732f5a28be27709a3ec9536cdb9341355f964b1f34df827db8ad3c7b64802b07.exe
-
Size
1.7MB
-
Sample
241010-b571gazblq
-
MD5
132da2630afde7e9e0c13b0856c2be5b
-
SHA1
012d8cf0e9e8be146b75db83eaa56929409d09e6
-
SHA256
732f5a28be27709a3ec9536cdb9341355f964b1f34df827db8ad3c7b64802b07
-
SHA512
6b5c133225ba6ad361b2ff52b69232eec57ac23b732f50e9bb442cacbc6559be03630854ea22989a812ce547e7eba00ed70a1ed297c018f68138cc8c541e636d
-
SSDEEP
49152:zSjMD8Y7Bez5F7uhWENtjvuVjYTR6LO4VpcbVz:+4F7+6TtjvgWpZ
Static task
static1
Behavioral task
behavioral1
Sample
732f5a28be27709a3ec9536cdb9341355f964b1f34df827db8ad3c7b64802b07.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Targets
-
-
Target
732f5a28be27709a3ec9536cdb9341355f964b1f34df827db8ad3c7b64802b07.exe
-
Size
1.7MB
-
MD5
132da2630afde7e9e0c13b0856c2be5b
-
SHA1
012d8cf0e9e8be146b75db83eaa56929409d09e6
-
SHA256
732f5a28be27709a3ec9536cdb9341355f964b1f34df827db8ad3c7b64802b07
-
SHA512
6b5c133225ba6ad361b2ff52b69232eec57ac23b732f50e9bb442cacbc6559be03630854ea22989a812ce547e7eba00ed70a1ed297c018f68138cc8c541e636d
-
SSDEEP
49152:zSjMD8Y7Bez5F7uhWENtjvuVjYTR6LO4VpcbVz:+4F7+6TtjvgWpZ
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2