General
-
Target
d83ad5281687462f303ced4b7a986ca7756a5e77390561ac3211c8832925dd0c.exe
-
Size
1.7MB
-
Sample
250101-z1vfkswrel
-
MD5
2727810a8eb8ccbe275348f3b486bb1d
-
SHA1
a31f67a073cd0fe0b4c621142dbba43fdf7eb036
-
SHA256
d83ad5281687462f303ced4b7a986ca7756a5e77390561ac3211c8832925dd0c
-
SHA512
ef362ab194cfe4e10f9e8d62e206725b506906a1ba5a5d8de08e8bbfc6d579720daae6d4723fd4f3bb9ffe314247ea424530bef12f91756613a82e3fcdb0fef3
-
SSDEEP
49152:8DuQ9v2C1ckYvOoRSQPUiSTnK2ygVk6uzsxnzq:8DmC1Ja1SWrSjKHAvnzq
Static task
static1
Behavioral task
behavioral1
Sample
d83ad5281687462f303ced4b7a986ca7756a5e77390561ac3211c8832925dd0c.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
d83ad5281687462f303ced4b7a986ca7756a5e77390561ac3211c8832925dd0c.exe
-
Size
1.7MB
-
MD5
2727810a8eb8ccbe275348f3b486bb1d
-
SHA1
a31f67a073cd0fe0b4c621142dbba43fdf7eb036
-
SHA256
d83ad5281687462f303ced4b7a986ca7756a5e77390561ac3211c8832925dd0c
-
SHA512
ef362ab194cfe4e10f9e8d62e206725b506906a1ba5a5d8de08e8bbfc6d579720daae6d4723fd4f3bb9ffe314247ea424530bef12f91756613a82e3fcdb0fef3
-
SSDEEP
49152:8DuQ9v2C1ckYvOoRSQPUiSTnK2ygVk6uzsxnzq:8DmC1Ja1SWrSjKHAvnzq
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2