General
-
Target
35eb71c559bf09fdb27c7a8707f6e9aaec240f24a514028f7bc5b5f064b7c6cf.exe
-
Size
1.8MB
-
Sample
241128-cxsfgs1mg1
-
MD5
8b37da1bb0f8d2953a81c329b8d5f88e
-
SHA1
d184f08cdfc764911a0adc57b86031519657efd6
-
SHA256
35eb71c559bf09fdb27c7a8707f6e9aaec240f24a514028f7bc5b5f064b7c6cf
-
SHA512
415577986654b15fceb5b98a03777866137bad972b591aeecbbf877a8f10fd9e4088e69061980431d756cb6f8f22413d3fc31bd0e8ddf1b0466240852e05aeda
-
SSDEEP
49152:ZeKl+JH0gNdAPRBn1OOtSMYsS12DZo7IiG36oIcGFlR:ZXl+d5wZkYw2IQcFlR
Static task
static1
Behavioral task
behavioral1
Sample
35eb71c559bf09fdb27c7a8707f6e9aaec240f24a514028f7bc5b5f064b7c6cf.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
lumma
https://hallowed-noisy.sbs/api
https://plastic-mitten.sbs/api
https://looky-marked.sbs/api
https://wrench-creter.sbs/api
https://slam-whipp.sbs/api
https://record-envyp.sbs/api
https://copper-replace.sbs/api
https://savvy-steereo.sbs/api
https://preside-comforter.sbs/api
Targets
-
-
Target
35eb71c559bf09fdb27c7a8707f6e9aaec240f24a514028f7bc5b5f064b7c6cf.exe
-
Size
1.8MB
-
MD5
8b37da1bb0f8d2953a81c329b8d5f88e
-
SHA1
d184f08cdfc764911a0adc57b86031519657efd6
-
SHA256
35eb71c559bf09fdb27c7a8707f6e9aaec240f24a514028f7bc5b5f064b7c6cf
-
SHA512
415577986654b15fceb5b98a03777866137bad972b591aeecbbf877a8f10fd9e4088e69061980431d756cb6f8f22413d3fc31bd0e8ddf1b0466240852e05aeda
-
SSDEEP
49152:ZeKl+JH0gNdAPRBn1OOtSMYsS12DZo7IiG36oIcGFlR:ZXl+d5wZkYw2IQcFlR
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-