General
-
Target
PLM0K_file.exe
-
Size
1.8MB
-
Sample
241128-a2a1wsxpcz
-
MD5
bd1308de2b317dcd51b75154ddeb5a6b
-
SHA1
a39fac69239d05bec64b45dfdae6eae8ed64c3b4
-
SHA256
37d68fff5906f3fb903ef0937bfc9a74876fa220f0c010bd2505f6f61ac97c43
-
SHA512
45bf4090f2835cf26631d80390b9eca17da70615ea37603bb3d1bbaac3525dbf0edc061ed685d29fe65c03b7859d5c1f8375a8fcffcf7155e9265d4a38350e65
-
SSDEEP
24576:gw8iagXTirClQWtfRThh80ZA0znHZZH/NyWx1HG4r6xR2XGJYEK57hSxLdBD:l8SQCBxRThzh/IcBMcOISxL
Static task
static1
Behavioral task
behavioral1
Sample
PLM0K_file.exe
Resource
win7-20241023-en
Malware Config
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
lumma
https://hallowed-noisy.sbs/api
https://plastic-mitten.sbs/api
https://looky-marked.sbs/api
https://wrench-creter.sbs/api
https://slam-whipp.sbs/api
https://record-envyp.sbs/api
https://copper-replace.sbs/api
https://savvy-steereo.sbs/api
https://preside-comforter.sbs/api
Targets
-
-
Target
PLM0K_file.exe
-
Size
1.8MB
-
MD5
bd1308de2b317dcd51b75154ddeb5a6b
-
SHA1
a39fac69239d05bec64b45dfdae6eae8ed64c3b4
-
SHA256
37d68fff5906f3fb903ef0937bfc9a74876fa220f0c010bd2505f6f61ac97c43
-
SHA512
45bf4090f2835cf26631d80390b9eca17da70615ea37603bb3d1bbaac3525dbf0edc061ed685d29fe65c03b7859d5c1f8375a8fcffcf7155e9265d4a38350e65
-
SSDEEP
24576:gw8iagXTirClQWtfRThh80ZA0znHZZH/NyWx1HG4r6xR2XGJYEK57hSxLdBD:l8SQCBxRThzh/IcBMcOISxL
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-