General
-
Target
95db7c3a8343cbfac2007296fcb6868660c546ea5e0f727d27e5ee384b243e33N.exe
-
Size
1.7MB
-
Sample
250102-fgy5wawqhm
-
MD5
4c338813afa0351f41aeba38f63bd1c0
-
SHA1
d35e6a03530ea23ef570be15b75d1f3cb43af11c
-
SHA256
95db7c3a8343cbfac2007296fcb6868660c546ea5e0f727d27e5ee384b243e33
-
SHA512
cba4ded73e2d9ce24f74248b5afd9ecf776e69494fc075e31e2e5896c4634438ff25fc5e7a711c673a9577d01a6c8249d79c51494b0e60cb93bc53bc84e5e06a
-
SSDEEP
49152:8DuQ9v2C1ckYvOoRSQPUiSTnK2ygVk6uzsxnz:8DmC1Ja1SWrSjKHAvnz
Static task
static1
Behavioral task
behavioral1
Sample
95db7c3a8343cbfac2007296fcb6868660c546ea5e0f727d27e5ee384b243e33N.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://fancywaxxers.shop/api
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Targets
-
-
Target
95db7c3a8343cbfac2007296fcb6868660c546ea5e0f727d27e5ee384b243e33N.exe
-
Size
1.7MB
-
MD5
4c338813afa0351f41aeba38f63bd1c0
-
SHA1
d35e6a03530ea23ef570be15b75d1f3cb43af11c
-
SHA256
95db7c3a8343cbfac2007296fcb6868660c546ea5e0f727d27e5ee384b243e33
-
SHA512
cba4ded73e2d9ce24f74248b5afd9ecf776e69494fc075e31e2e5896c4634438ff25fc5e7a711c673a9577d01a6c8249d79c51494b0e60cb93bc53bc84e5e06a
-
SSDEEP
49152:8DuQ9v2C1ckYvOoRSQPUiSTnK2ygVk6uzsxnz:8DmC1Ja1SWrSjKHAvnz
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2