General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241128-ct5lmsxlal
-
MD5
91e740030ed48b59d9b047bab2bbe942
-
SHA1
e0d82ab37149e5dc7663ee3a22e43270aa895ae1
-
SHA256
704afcdd44b857e83f9a519d8888013e20efd631ffe0ba225759d310e9151a98
-
SHA512
32f7727f39e6d1908e723c5b2fce1a7b2098ef7b66ca23d06109a88f5960216ed5990f6ae06b90fde9f81adfafc9e044a9d672f64e1d02c1b2a6a2f8dc769f88
-
SSDEEP
49152:0S3682atB7GQUzmTTqPhVdv5wP4mlLtJ3d+r:TAMNGb6Tsj84WLa
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
Malware Config
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
lumma
https://hallowed-noisy.sbs/api
https://plastic-mitten.sbs/api
https://looky-marked.sbs/api
https://wrench-creter.sbs/api
https://slam-whipp.sbs/api
https://record-envyp.sbs/api
https://copper-replace.sbs/api
https://savvy-steereo.sbs/api
https://preside-comforter.sbs/api
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
91e740030ed48b59d9b047bab2bbe942
-
SHA1
e0d82ab37149e5dc7663ee3a22e43270aa895ae1
-
SHA256
704afcdd44b857e83f9a519d8888013e20efd631ffe0ba225759d310e9151a98
-
SHA512
32f7727f39e6d1908e723c5b2fce1a7b2098ef7b66ca23d06109a88f5960216ed5990f6ae06b90fde9f81adfafc9e044a9d672f64e1d02c1b2a6a2f8dc769f88
-
SSDEEP
49152:0S3682atB7GQUzmTTqPhVdv5wP4mlLtJ3d+r:TAMNGb6Tsj84WLa
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2