General
-
Target
cc667d24c723a4963225b68b04bb90c6436ccfecd456c8cc1d3eec80d3ff4d9d
-
Size
1.8MB
-
Sample
241118-s6bgbsvker
-
MD5
f99ff5e64815a0f5c12d7ac3c308dcad
-
SHA1
42b69c5c2e32df7181e790663ec59cb3cd3e5e3e
-
SHA256
cc667d24c723a4963225b68b04bb90c6436ccfecd456c8cc1d3eec80d3ff4d9d
-
SHA512
984ca41dff503250b2378e9346bfdf99c693c20c7ba9442fd78c0db9408f31aba9e4659da33ba94ba5fd987bbe4b8d1f801a930827a90265b839663fe45ee29c
-
SSDEEP
49152:jpmEmZl5jvoUeHUS9P77+IfMK/FN1Zu6Tq60YWpP0x5:jpmEmhx0pRVMK/n1Pf36PI
Static task
static1
Behavioral task
behavioral1
Sample
cc667d24c723a4963225b68b04bb90c6436ccfecd456c8cc1d3eec80d3ff4d9d.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
cc667d24c723a4963225b68b04bb90c6436ccfecd456c8cc1d3eec80d3ff4d9d
-
Size
1.8MB
-
MD5
f99ff5e64815a0f5c12d7ac3c308dcad
-
SHA1
42b69c5c2e32df7181e790663ec59cb3cd3e5e3e
-
SHA256
cc667d24c723a4963225b68b04bb90c6436ccfecd456c8cc1d3eec80d3ff4d9d
-
SHA512
984ca41dff503250b2378e9346bfdf99c693c20c7ba9442fd78c0db9408f31aba9e4659da33ba94ba5fd987bbe4b8d1f801a930827a90265b839663fe45ee29c
-
SSDEEP
49152:jpmEmZl5jvoUeHUS9P77+IfMK/FN1Zu6Tq60YWpP0x5:jpmEmhx0pRVMK/n1Pf36PI
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2