General
-
Target
file.exe
-
Size
2.8MB
-
Sample
241018-n7g82sybrl
-
MD5
8ef2306f9acfefba1cb29b83e6c1d52d
-
SHA1
9e20ad60c4133c2b3f6ab43a6276ca1ef52a4a56
-
SHA256
64f31958b14feaf71969133ab324d9954cb0b94fefa190a277f4d75fbb0818f6
-
SHA512
e7d2bfbf22d1a8a7322e0260b8dbeed25295a61c772f6e7cdfc7a0f2d6b1eb8f9b739d7002a6e1fe1aa30e86f7d1fbfa2aba20a84705b2458149c0937730ae48
-
SSDEEP
49152:6ny2gye18qD/7A3LwN092TxDH7nBSZHJC0SEd:F2gye18+/7AsN092TxHnBUC0b
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://clearancek.site
https://licendfilteo.site
https://spirittunek.store
https://bathdoomgaz.store
https://studennotediw.store
https://dissapoiznw.store
https://eaglepawnoy.store
https://mobbipenju.store
Targets
-
-
Target
file.exe
-
Size
2.8MB
-
MD5
8ef2306f9acfefba1cb29b83e6c1d52d
-
SHA1
9e20ad60c4133c2b3f6ab43a6276ca1ef52a4a56
-
SHA256
64f31958b14feaf71969133ab324d9954cb0b94fefa190a277f4d75fbb0818f6
-
SHA512
e7d2bfbf22d1a8a7322e0260b8dbeed25295a61c772f6e7cdfc7a0f2d6b1eb8f9b739d7002a6e1fe1aa30e86f7d1fbfa2aba20a84705b2458149c0937730ae48
-
SSDEEP
49152:6ny2gye18qD/7A3LwN092TxDH7nBSZHJC0SEd:F2gye18+/7AsN092TxHnBUC0b
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2