General
-
Target
2587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f.exe
-
Size
1.8MB
-
Sample
241119-ep385a1bpl
-
MD5
1eb8c694c08ad5e6a7554d954ce3b7df
-
SHA1
76ed2916a8b9efe93b8b2e5cc29d232b6e5b8b93
-
SHA256
2587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f
-
SHA512
e58a5cf646f2651682cd2571fe7b316205071ca7ba48b5085a97c8ff44a1167058f258b5b91edb0445d581ed08bbca00d388c647dc82b4d691b058beac3457ee
-
SSDEEP
49152:zsb2kJWapjgRaEEqfVdlNWmxjihAqOLjO9Kt2jiX6:zsb2kJWapjgMEt9NXjSAqOG9C2jK6
Static task
static1
Behavioral task
behavioral1
Sample
2587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
2587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f.exe
-
Size
1.8MB
-
MD5
1eb8c694c08ad5e6a7554d954ce3b7df
-
SHA1
76ed2916a8b9efe93b8b2e5cc29d232b6e5b8b93
-
SHA256
2587bee40a1bc2b122d521a5068a01b7a02b13333da8b164874a93165e2b603f
-
SHA512
e58a5cf646f2651682cd2571fe7b316205071ca7ba48b5085a97c8ff44a1167058f258b5b91edb0445d581ed08bbca00d388c647dc82b4d691b058beac3457ee
-
SSDEEP
49152:zsb2kJWapjgRaEEqfVdlNWmxjihAqOLjO9Kt2jiX6:zsb2kJWapjgMEt9NXjSAqOG9C2jK6
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2