General
-
Target
7d3ff60eb3f4fe76d57d1728d471c939c29e4003e3ec832efa8dfbb62c52afd9.exe
-
Size
3.0MB
-
Sample
241120-pm1qbswfne
-
MD5
b98d719fbc91a7701efe33b8a4e715ae
-
SHA1
7341034f5a0c569badf247492442cd1342bc92d8
-
SHA256
7d3ff60eb3f4fe76d57d1728d471c939c29e4003e3ec832efa8dfbb62c52afd9
-
SHA512
7f0651c101a47782855f107bbb2fb36858ac52c1d9fb91d314b50542b2b65d3edd0ea7aa6d0fdd913885f0367802c05ea0e24fc25ba23dd61969a1eee728bae3
-
SSDEEP
49152:RB6AjzEpL9b25V+GvrRwcsWt3HQpPaJpyu5PIFHtLKsyhKMprRLC1:rfjzE59bIV+GvrLsW+pyJpyoyksGRLk
Static task
static1
Behavioral task
behavioral1
Sample
7d3ff60eb3f4fe76d57d1728d471c939c29e4003e3ec832efa8dfbb62c52afd9.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Targets
-
-
Target
7d3ff60eb3f4fe76d57d1728d471c939c29e4003e3ec832efa8dfbb62c52afd9.exe
-
Size
3.0MB
-
MD5
b98d719fbc91a7701efe33b8a4e715ae
-
SHA1
7341034f5a0c569badf247492442cd1342bc92d8
-
SHA256
7d3ff60eb3f4fe76d57d1728d471c939c29e4003e3ec832efa8dfbb62c52afd9
-
SHA512
7f0651c101a47782855f107bbb2fb36858ac52c1d9fb91d314b50542b2b65d3edd0ea7aa6d0fdd913885f0367802c05ea0e24fc25ba23dd61969a1eee728bae3
-
SSDEEP
49152:RB6AjzEpL9b25V+GvrRwcsWt3HQpPaJpyu5PIFHtLKsyhKMprRLC1:rfjzE59bIV+GvrLsW+pyJpyoyksGRLk
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-