General
-
Target
abc7c4eae6f3707ad561026c93e16e352c5a28d8eefe071d0ae4d44fc8c8aba4.exe
-
Size
1.7MB
-
Sample
241119-fxjp5azhrb
-
MD5
57f67b4dd4e2eb450325b999139b9bc6
-
SHA1
6aada37bc4c211d6cd94447f12be3c97eedf60b2
-
SHA256
abc7c4eae6f3707ad561026c93e16e352c5a28d8eefe071d0ae4d44fc8c8aba4
-
SHA512
61e5469351cb42b3bd404dd4394eda961e64695e748299e5066ef785af7321ede06d71eb4990e5a747b074aee7d164dc95ee27b067735759b38e024b418f5872
-
SSDEEP
49152:GTA3a/FoU7VGfb7PM37w+3RWhuoj4BDiUoN6fFS:GAaNoUZG2N3RWhuoEBDi9SFS
Static task
static1
Behavioral task
behavioral1
Sample
abc7c4eae6f3707ad561026c93e16e352c5a28d8eefe071d0ae4d44fc8c8aba4.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
abc7c4eae6f3707ad561026c93e16e352c5a28d8eefe071d0ae4d44fc8c8aba4.exe
-
Size
1.7MB
-
MD5
57f67b4dd4e2eb450325b999139b9bc6
-
SHA1
6aada37bc4c211d6cd94447f12be3c97eedf60b2
-
SHA256
abc7c4eae6f3707ad561026c93e16e352c5a28d8eefe071d0ae4d44fc8c8aba4
-
SHA512
61e5469351cb42b3bd404dd4394eda961e64695e748299e5066ef785af7321ede06d71eb4990e5a747b074aee7d164dc95ee27b067735759b38e024b418f5872
-
SSDEEP
49152:GTA3a/FoU7VGfb7PM37w+3RWhuoj4BDiUoN6fFS:GAaNoUZG2N3RWhuoEBDi9SFS
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2