General
-
Target
5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2fN.exe
-
Size
1.7MB
-
Sample
241231-zlkb3a1lem
-
MD5
e9dcb1f16b0f4d16dda27e91e9f394e0
-
SHA1
47f99cb7c1ccb5a57a95debe478e4bfc7ff07d37
-
SHA256
5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2f
-
SHA512
54d9754a741a63637aa565598d4b7db42c27ea86bd37df11b4b91cb543f469e56e02c675ed8d32b0e0b5a303e2079ae55fb3c552c1c7132791cbf1810a51e0fe
-
SSDEEP
49152:heRYGkpoZljE7wJf2A94F9xxBvI3fWcrIGy:heR3ZZBE77O41xBGfrrI
Static task
static1
Behavioral task
behavioral1
Sample
5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2fN.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2fN.exe
-
Size
1.7MB
-
MD5
e9dcb1f16b0f4d16dda27e91e9f394e0
-
SHA1
47f99cb7c1ccb5a57a95debe478e4bfc7ff07d37
-
SHA256
5d7de4e442a2e7772b4c899d7bfa4eb61e1185d130fbdbb109e0de4f5bf1ef2f
-
SHA512
54d9754a741a63637aa565598d4b7db42c27ea86bd37df11b4b91cb543f469e56e02c675ed8d32b0e0b5a303e2079ae55fb3c552c1c7132791cbf1810a51e0fe
-
SSDEEP
49152:heRYGkpoZljE7wJf2A94F9xxBvI3fWcrIGy:heR3ZZBE77O41xBGfrrI
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2