General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241128-l2sfqazmfn
-
MD5
d4aadd87af5fd4945bcbc76ff3d44e06
-
SHA1
55022b47287c2adef01bf8a5de17d320e3a507df
-
SHA256
d9afff60a7ef435234176904e6490409c99acd991a9cafe856f59b7e2064b486
-
SHA512
a89a6d0667d78e02b40f6e20868e7142a1c0866121daf22c1a686264b263b1467e1b4d377266d8a701ea93433fa0cda36307b0eba452e4c5a66c7a76ccdf7984
-
SSDEEP
49152:MwhhLlUJjfP90moldFa3F9OXZY/O+0Vh2EajWfv:VuJ6lldIXOXZY/O+0Hv
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
d4aadd87af5fd4945bcbc76ff3d44e06
-
SHA1
55022b47287c2adef01bf8a5de17d320e3a507df
-
SHA256
d9afff60a7ef435234176904e6490409c99acd991a9cafe856f59b7e2064b486
-
SHA512
a89a6d0667d78e02b40f6e20868e7142a1c0866121daf22c1a686264b263b1467e1b4d377266d8a701ea93433fa0cda36307b0eba452e4c5a66c7a76ccdf7984
-
SSDEEP
49152:MwhhLlUJjfP90moldFa3F9OXZY/O+0Vh2EajWfv:VuJ6lldIXOXZY/O+0Hv
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2