General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241126-3z5rpssqdl
-
MD5
c1756ba8e668171e8a8222cb72b339cf
-
SHA1
08c69f22e986d3e2844a995b6081fb04dea78c9a
-
SHA256
b2f68e815f18b56d167d9aa0b4e4752e62a3a355a84198fe64692245d653ebc5
-
SHA512
a515bba1ab918aa7014ff1af0a77ea2b7b084305230f826326f1b2b7e686c30e0f4276818228bf7b4e361ddb60732a4a3f72a0485220157880db8b5dbc6583b3
-
SSDEEP
49152:1D9VpExlH4JoSvKYICrQNWwjGDqiHcqGlRsZAertD0Nr:Z9P4lYVvKGrQNWNvHbGXsZA0Dar
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
c1756ba8e668171e8a8222cb72b339cf
-
SHA1
08c69f22e986d3e2844a995b6081fb04dea78c9a
-
SHA256
b2f68e815f18b56d167d9aa0b4e4752e62a3a355a84198fe64692245d653ebc5
-
SHA512
a515bba1ab918aa7014ff1af0a77ea2b7b084305230f826326f1b2b7e686c30e0f4276818228bf7b4e361ddb60732a4a3f72a0485220157880db8b5dbc6583b3
-
SSDEEP
49152:1D9VpExlH4JoSvKYICrQNWwjGDqiHcqGlRsZAertD0Nr:Z9P4lYVvKGrQNWNvHbGXsZA0Dar
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-