General
-
Target
4228e97724980aca0a25821d4aa53168ac8a20bcbaab317f339a34a135b1ec6d.exe
-
Size
1.8MB
-
Sample
250101-ywzdas1rht
-
MD5
fe665dcd4109f1507f7c17410554a21b
-
SHA1
4f94bd90cfcde9dd82e9a824428c6cc18a16e11f
-
SHA256
4228e97724980aca0a25821d4aa53168ac8a20bcbaab317f339a34a135b1ec6d
-
SHA512
e71ea36e45003d7e6b8e3dcbe9093e578bf8112dbc237445b5d8abaab29b339833c209f0cf45279be89011ec81f58d4fff954432a0148dba428fd59f6e357304
-
SSDEEP
49152:Jzz9h8wy4hQpAZZdHDHP9uWEitEuT64tp9Btuo+t8:JzW0vBlu4tXZr+q
Static task
static1
Behavioral task
behavioral1
Sample
4228e97724980aca0a25821d4aa53168ac8a20bcbaab317f339a34a135b1ec6d.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Targets
-
-
Target
4228e97724980aca0a25821d4aa53168ac8a20bcbaab317f339a34a135b1ec6d.exe
-
Size
1.8MB
-
MD5
fe665dcd4109f1507f7c17410554a21b
-
SHA1
4f94bd90cfcde9dd82e9a824428c6cc18a16e11f
-
SHA256
4228e97724980aca0a25821d4aa53168ac8a20bcbaab317f339a34a135b1ec6d
-
SHA512
e71ea36e45003d7e6b8e3dcbe9093e578bf8112dbc237445b5d8abaab29b339833c209f0cf45279be89011ec81f58d4fff954432a0148dba428fd59f6e357304
-
SSDEEP
49152:Jzz9h8wy4hQpAZZdHDHP9uWEitEuT64tp9Btuo+t8:JzW0vBlu4tXZr+q
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2