General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241119-pxbtyswkat
-
MD5
6f312c1be161d6c4ad74eacf45dbedaa
-
SHA1
1b4bc727785fdd3866beba78f9bfb23aa3c24b68
-
SHA256
cabfa6f56edf1a06d0d3cf5307376b3ef9ced0dc302359f58419a21a2fb35ce9
-
SHA512
82cd197930a772e0037b85233a65e2f2e1449923810ae9d0371e9b35e80c9a606be7e568cada7050ceddbac10d35ae007c668edc4423b158dc61eaedc474ae31
-
SSDEEP
49152:FQ1c8zIyMTP1vNtPNMWfCVjqCRGb5B1XB:Fkc8zfMTP1vvzKBkVjR
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
6f312c1be161d6c4ad74eacf45dbedaa
-
SHA1
1b4bc727785fdd3866beba78f9bfb23aa3c24b68
-
SHA256
cabfa6f56edf1a06d0d3cf5307376b3ef9ced0dc302359f58419a21a2fb35ce9
-
SHA512
82cd197930a772e0037b85233a65e2f2e1449923810ae9d0371e9b35e80c9a606be7e568cada7050ceddbac10d35ae007c668edc4423b158dc61eaedc474ae31
-
SSDEEP
49152:FQ1c8zIyMTP1vNtPNMWfCVjqCRGb5B1XB:Fkc8zfMTP1vvzKBkVjR
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2