General
-
Target
c42744945dad8a8d26c2f7d411bf45de56d564584ebc798901ac86be2f620bbdN.exe
-
Size
1.8MB
-
Sample
250102-ecz1ya1qby
-
MD5
7035d0cc4f7b5972cf12f3f58adbb800
-
SHA1
73e19872f27843c3090081cda54b502bbe0dc71d
-
SHA256
c42744945dad8a8d26c2f7d411bf45de56d564584ebc798901ac86be2f620bbd
-
SHA512
256c40923ef4e93cb0a7de97639c1c8a87aef6bcdabd197aff3dcd70d7c31f293727be254122048aa9724b22f05a7fd1db21e45ee7514768fc75683a3d91f59f
-
SSDEEP
49152:Jzz9h8wy4hQpAZZdHDHP9uWEitEuT64tp9Btuo+t:JzW0vBlu4tXZr+
Static task
static1
Behavioral task
behavioral1
Sample
c42744945dad8a8d26c2f7d411bf45de56d564584ebc798901ac86be2f620bbdN.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Targets
-
-
Target
c42744945dad8a8d26c2f7d411bf45de56d564584ebc798901ac86be2f620bbdN.exe
-
Size
1.8MB
-
MD5
7035d0cc4f7b5972cf12f3f58adbb800
-
SHA1
73e19872f27843c3090081cda54b502bbe0dc71d
-
SHA256
c42744945dad8a8d26c2f7d411bf45de56d564584ebc798901ac86be2f620bbd
-
SHA512
256c40923ef4e93cb0a7de97639c1c8a87aef6bcdabd197aff3dcd70d7c31f293727be254122048aa9724b22f05a7fd1db21e45ee7514768fc75683a3d91f59f
-
SSDEEP
49152:Jzz9h8wy4hQpAZZdHDHP9uWEitEuT64tp9Btuo+t:JzW0vBlu4tXZr+
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2