General
-
Target
89d52483511cad269996b2e1dbe87c958bdbd4b5567e7d8cad0abbcf710f839aN.exe
-
Size
2.9MB
-
Sample
241231-fjgnlsymcs
-
MD5
ce1ebe1f0dd4d6d5866d0917439c24a0
-
SHA1
4800104f6e2984849ea41d0fb307336511b7b4c4
-
SHA256
89d52483511cad269996b2e1dbe87c958bdbd4b5567e7d8cad0abbcf710f839a
-
SHA512
fc69ff5c7861852ab1cccfe0bc4b8205d95db30f31d230f6ef0755244dd64e7db0af9d4f7f23f54673582187efce4989b57476e467460827151a3cdfe1362e8d
-
SSDEEP
49152:l7zQaQ8YdgL3tBqSQLmRVro/M//rbj5aP:eF8YdgLDqJL8ro/83d4
Static task
static1
Behavioral task
behavioral1
Sample
89d52483511cad269996b2e1dbe87c958bdbd4b5567e7d8cad0abbcf710f839aN.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
Targets
-
-
Target
89d52483511cad269996b2e1dbe87c958bdbd4b5567e7d8cad0abbcf710f839aN.exe
-
Size
2.9MB
-
MD5
ce1ebe1f0dd4d6d5866d0917439c24a0
-
SHA1
4800104f6e2984849ea41d0fb307336511b7b4c4
-
SHA256
89d52483511cad269996b2e1dbe87c958bdbd4b5567e7d8cad0abbcf710f839a
-
SHA512
fc69ff5c7861852ab1cccfe0bc4b8205d95db30f31d230f6ef0755244dd64e7db0af9d4f7f23f54673582187efce4989b57476e467460827151a3cdfe1362e8d
-
SSDEEP
49152:l7zQaQ8YdgL3tBqSQLmRVro/M//rbj5aP:eF8YdgLDqJL8ro/83d4
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2