General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241120-gcagdsskct
-
MD5
06cdf5cbdfa34fce7dfde3b0b0fb8258
-
SHA1
5acef066031742cc94cbcd9cbb34b2f36b8292d3
-
SHA256
a751a6e56e59c37aa6371702d8e1f1651b28d9632b98ff3e2673f16052594e14
-
SHA512
907fb4404c71b586872f212d12161993309ecc9ba13551ae674da7da2d1a055fe9a618a7ddcc4619e27b297b90b94d73e7765316a60f15d35973b6d38b2ca39b
-
SSDEEP
49152:QIZKwvcNCirq/1RgTVa5fQiXDsDl80iveF:3ckcNCirq0To50lN5
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
Extracted
lumma
https://cook-rain.sbs/api
https://librari-night.sbs/api
https://befall-sm0ker.sbs/api
https://owner-vacat10n.sbs/api
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
06cdf5cbdfa34fce7dfde3b0b0fb8258
-
SHA1
5acef066031742cc94cbcd9cbb34b2f36b8292d3
-
SHA256
a751a6e56e59c37aa6371702d8e1f1651b28d9632b98ff3e2673f16052594e14
-
SHA512
907fb4404c71b586872f212d12161993309ecc9ba13551ae674da7da2d1a055fe9a618a7ddcc4619e27b297b90b94d73e7765316a60f15d35973b6d38b2ca39b
-
SSDEEP
49152:QIZKwvcNCirq/1RgTVa5fQiXDsDl80iveF:3ckcNCirq0To50lN5
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2