General
-
Target
7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44.exe
-
Size
2.8MB
-
Sample
241102-gzrdeszgrj
-
MD5
343a031e57648c45d10f16fbb153e47a
-
SHA1
9724cdf4636f15541a0cbb7b401e7c5482edafa2
-
SHA256
7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44
-
SHA512
d78d2457e4a799c1042394939c36cce304a332c2e354977b6a366923e98f6aca2b7270ca1aaf0b4195ef8094837f1fd832b02bcb7d0a5f1f0b75cf7939a815a6
-
SSDEEP
49152:+hG5ErNrkbljL3tD+/KvuJG/3b5Iw0yJ:+hG5E5kZjL9C/KGJG/6L
Static task
static1
Behavioral task
behavioral1
Sample
7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Targets
-
-
Target
7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44.exe
-
Size
2.8MB
-
MD5
343a031e57648c45d10f16fbb153e47a
-
SHA1
9724cdf4636f15541a0cbb7b401e7c5482edafa2
-
SHA256
7fcec3f5f2584788391ad8de7bb93b3d3f2833b0e181057e9eb3051d8e9e1c44
-
SHA512
d78d2457e4a799c1042394939c36cce304a332c2e354977b6a366923e98f6aca2b7270ca1aaf0b4195ef8094837f1fd832b02bcb7d0a5f1f0b75cf7939a815a6
-
SSDEEP
49152:+hG5ErNrkbljL3tD+/KvuJG/3b5Iw0yJ:+hG5E5kZjL9C/KGJG/6L
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-