General
-
Target
43917446f022a9526e726ef8f1b80f8076118c789be40246f3b2b6f644f6e077N.exe
-
Size
1.8MB
-
Sample
250103-qlxsqaynfr
-
MD5
f0b8cca9834c699f7d68a7e4596e8d70
-
SHA1
b90fe174a6df530f8975b5ae2b3bc44e0260b013
-
SHA256
43917446f022a9526e726ef8f1b80f8076118c789be40246f3b2b6f644f6e077
-
SHA512
a09ecdd671ab44cbccf0b915c3c3067067e9c124b1a1a33439c3e07af74381ea28cdbd1dc80c6a5d2001afd682e3d30e3b925e7efe0a7a2226e9ee894ee32c13
-
SSDEEP
49152:01TGnIEL6UJrBhTWiv3rOPjbl3egrmbXgZg2+Jc:cTAIEL6UJ1hTWiaPjbl3ebb6F
Static task
static1
Behavioral task
behavioral1
Sample
43917446f022a9526e726ef8f1b80f8076118c789be40246f3b2b6f644f6e077N.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://pollution-raker.cyou/api
https://hosue-billowy.cyou/api
https://ripe-blade.cyou/api
https://smash-boiling.cyou/api
https://supporse-comment.cyou/api
https://greywe-snotty.cyou/api
https://steppriflej.xyz/api
https://sendypaster.xyz/api
https://cuddlyready.xyz/api
Targets
-
-
Target
43917446f022a9526e726ef8f1b80f8076118c789be40246f3b2b6f644f6e077N.exe
-
Size
1.8MB
-
MD5
f0b8cca9834c699f7d68a7e4596e8d70
-
SHA1
b90fe174a6df530f8975b5ae2b3bc44e0260b013
-
SHA256
43917446f022a9526e726ef8f1b80f8076118c789be40246f3b2b6f644f6e077
-
SHA512
a09ecdd671ab44cbccf0b915c3c3067067e9c124b1a1a33439c3e07af74381ea28cdbd1dc80c6a5d2001afd682e3d30e3b925e7efe0a7a2226e9ee894ee32c13
-
SSDEEP
49152:01TGnIEL6UJrBhTWiv3rOPjbl3egrmbXgZg2+Jc:cTAIEL6UJ1hTWiaPjbl3ebb6F
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-