General
-
Target
6f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc
-
Size
1.8MB
-
Sample
241127-ze8q3szjcw
-
MD5
0a75820b356a011e9fa427d658f1e3c0
-
SHA1
a57469622af0b25fc3a07d071dcbe1526c41881f
-
SHA256
6f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc
-
SHA512
37641be0b9191f3688c9dd539da7ad20729b6e1fbac770e08868e8ad3226138a58fe95390ed28cb10ec478eec44065e68b4a8c5136b5d9a638db17767f75cecb
-
SSDEEP
49152:ep/BSL9Xr3kN25zfa8ZCxxBO49uvH6Lt6kCb:euLdko5jvCx39uwwkCb
Static task
static1
Behavioral task
behavioral1
Sample
6f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc.exe
Resource
win7-20241023-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Targets
-
-
Target
6f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc
-
Size
1.8MB
-
MD5
0a75820b356a011e9fa427d658f1e3c0
-
SHA1
a57469622af0b25fc3a07d071dcbe1526c41881f
-
SHA256
6f064372869eee9be9b504a086011c8beb3d7c753a87bd0a28c44ee5a22c6ffc
-
SHA512
37641be0b9191f3688c9dd539da7ad20729b6e1fbac770e08868e8ad3226138a58fe95390ed28cb10ec478eec44065e68b4a8c5136b5d9a638db17767f75cecb
-
SSDEEP
49152:ep/BSL9Xr3kN25zfa8ZCxxBO49uvH6Lt6kCb:euLdko5jvCx39uwwkCb
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2