General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241121-l2r5ys1aka
-
MD5
07b5dfd3ec7ec5027e2d365c8eaae3e5
-
SHA1
4d33a67a726467a5856c5c96f9171711991eb399
-
SHA256
41347ee43538fc482dad56bbcc2536affa28ab067bba3852ec7d76a497c7783a
-
SHA512
907a4eb1554092ac5d3826dcc4efc51bb48d5b0768783547dcd93ab91901cf5cbfb3ed9006c3d377a6aef2cf802dfb82bbeee70a4b74f0c967623f931aa440e4
-
SSDEEP
24576:G0rECuZpR4P1hWRBnAOVj05sbj00BjRnOhKlT0zlDqGSa1h91s+N2t9aKYa7HNLe:kCVthsjZo0BjD4lf/1h9PAa2NGKzI
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
Malware Config
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
Extracted
lumma
https://cook-rain.sbs/api
https://librari-night.sbs/api
https://befall-sm0ker.sbs/api
https://owner-vacat10n.sbs/api
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
07b5dfd3ec7ec5027e2d365c8eaae3e5
-
SHA1
4d33a67a726467a5856c5c96f9171711991eb399
-
SHA256
41347ee43538fc482dad56bbcc2536affa28ab067bba3852ec7d76a497c7783a
-
SHA512
907a4eb1554092ac5d3826dcc4efc51bb48d5b0768783547dcd93ab91901cf5cbfb3ed9006c3d377a6aef2cf802dfb82bbeee70a4b74f0c967623f931aa440e4
-
SSDEEP
24576:G0rECuZpR4P1hWRBnAOVj05sbj00BjRnOhKlT0zlDqGSa1h91s+N2t9aKYa7HNLe:kCVthsjZo0BjD4lf/1h9PAa2NGKzI
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2