General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241127-xqxf3sslem
-
MD5
fd1f2501fbb5f83648efd77157d22a11
-
SHA1
745de9c6dcaa0fef52a724fa404f38d861c92ed8
-
SHA256
f98fe19e292f629b6aec9d727a675d300a4c5dd120838cbd4947e1886c79bbc8
-
SHA512
c6d14636931628721716a1c30cce21a208cff987dd13a191f371cc1232c6706a5f31e981db2667d459675abe626b8bf8eba5ff5a6a4d0d67439b4b9dba6c6459
-
SSDEEP
49152:d3O9zNoh+Sb8IRzGI1pcm2lJQpkD+EMxG0R:ZEZg8cKIk57ykDiR
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
fd1f2501fbb5f83648efd77157d22a11
-
SHA1
745de9c6dcaa0fef52a724fa404f38d861c92ed8
-
SHA256
f98fe19e292f629b6aec9d727a675d300a4c5dd120838cbd4947e1886c79bbc8
-
SHA512
c6d14636931628721716a1c30cce21a208cff987dd13a191f371cc1232c6706a5f31e981db2667d459675abe626b8bf8eba5ff5a6a4d0d67439b4b9dba6c6459
-
SSDEEP
49152:d3O9zNoh+Sb8IRzGI1pcm2lJQpkD+EMxG0R:ZEZg8cKIk57ykDiR
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-