General
-
Target
1b33ae0e9637392cd2a7b623ad6b42e64480335fb516f23e426b6ce7979d1eb7
-
Size
1.8MB
-
Sample
241231-n6cl6s1qeq
-
MD5
2fa2cfbc274807ce2640328433f7981b
-
SHA1
02642f8633d595dd89e505af461364f70a4fd010
-
SHA256
1b33ae0e9637392cd2a7b623ad6b42e64480335fb516f23e426b6ce7979d1eb7
-
SHA512
48834a6b1e21504674e8a0bc456b5638d59d5cee6a0437a7677d9df2453751169b72686b49f4c477ab3b3a6d88ddb348fdfe9abc8c92314e10e6f86cb3ffd2d0
-
SSDEEP
49152:YeOx7EgHNUWirpWXz2+Gg0VQQvqNHAsL9KDr4:YdZNMtyz2Vg0iNz90
Static task
static1
Behavioral task
behavioral1
Sample
1b33ae0e9637392cd2a7b623ad6b42e64480335fb516f23e426b6ce7979d1eb7.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
1b33ae0e9637392cd2a7b623ad6b42e64480335fb516f23e426b6ce7979d1eb7
-
Size
1.8MB
-
MD5
2fa2cfbc274807ce2640328433f7981b
-
SHA1
02642f8633d595dd89e505af461364f70a4fd010
-
SHA256
1b33ae0e9637392cd2a7b623ad6b42e64480335fb516f23e426b6ce7979d1eb7
-
SHA512
48834a6b1e21504674e8a0bc456b5638d59d5cee6a0437a7677d9df2453751169b72686b49f4c477ab3b3a6d88ddb348fdfe9abc8c92314e10e6f86cb3ffd2d0
-
SSDEEP
49152:YeOx7EgHNUWirpWXz2+Gg0VQQvqNHAsL9KDr4:YdZNMtyz2Vg0iNz90
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2