General
-
Target
a58c2381b3a09794c5f79c1bc6358fd9.bin
-
Size
1.7MB
-
Sample
241119-b2zjxsybpb
-
MD5
0988fe17518d330107eb518be6014001
-
SHA1
1197316cd20b65798ae3ebcd626bd9661ed83f12
-
SHA256
68fb6bcd58b6bc5c14cd91ee99929fca4061b66fd88a6f25f9c97899bd312027
-
SHA512
61a574a000914f0fc504c39eaf9166f105ae97647223c4574ecf8dd8f109a40ee6e13615df5e2ee7588c5a8f0d8d17c050a4ef97ce1e2b2698ec503c8615bc64
-
SSDEEP
49152:iSGe30WricTx265KMHrGNCdiEtEszAE2wep8omOUZ9bOv0vyP:iSGMh0gHrz8E2tp8oWZVKzP
Static task
static1
Behavioral task
behavioral1
Sample
fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56.exe
-
Size
1.8MB
-
MD5
a58c2381b3a09794c5f79c1bc6358fd9
-
SHA1
70db592fd9154a831da656438c3f558c376b1053
-
SHA256
fef10d7378cf8912453034be5c0b36bab453d66962290a1a0b64222fb30f4e56
-
SHA512
4c5674acf0a738b09c6189ef04cccf33f33fdadace1e70bec3d163c934fd9343b4904bf952597647b6e0605b011898ff654e7b7dd2672dc3aa8cf5ebd8f41c40
-
SSDEEP
49152:tSCX+wKP8BbVj9qpptHUexGlt3nyLcndhW3Zeu:Afgbp9U0eolpyLMI5
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2