General
-
Target
4bcf10ec2eeadcd2cf2e90d4f0f12d881288371002b0e8ba9ba77ab0a19b2760N.exe
-
Size
1.8MB
-
Sample
250104-t2l8pszkbp
-
MD5
1d40726e94eb12d200dd3fe49f15aec0
-
SHA1
619d990acda726463c15b168337c192f7d69a297
-
SHA256
4bcf10ec2eeadcd2cf2e90d4f0f12d881288371002b0e8ba9ba77ab0a19b2760
-
SHA512
207cdd6b3dbd9072a5fa64ddee898fa745316ce4f175557a6b9d3cb3f82d03e23cc79760d1d83eeb9f27065e937d5d110c2b4b93497dc3119ed0b44f184f6489
-
SSDEEP
24576:NpMWDhpLCcEoRDV/oRgHkORYTbdnOlhSRtREPPAYAOKqZ5Kymq5QRoTAN8pM/KUw:NmWeax/gg3oUTSREXKqiym+QfPkvZ
Static task
static1
Behavioral task
behavioral1
Sample
4bcf10ec2eeadcd2cf2e90d4f0f12d881288371002b0e8ba9ba77ab0a19b2760N.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
4bcf10ec2eeadcd2cf2e90d4f0f12d881288371002b0e8ba9ba77ab0a19b2760N.exe
-
Size
1.8MB
-
MD5
1d40726e94eb12d200dd3fe49f15aec0
-
SHA1
619d990acda726463c15b168337c192f7d69a297
-
SHA256
4bcf10ec2eeadcd2cf2e90d4f0f12d881288371002b0e8ba9ba77ab0a19b2760
-
SHA512
207cdd6b3dbd9072a5fa64ddee898fa745316ce4f175557a6b9d3cb3f82d03e23cc79760d1d83eeb9f27065e937d5d110c2b4b93497dc3119ed0b44f184f6489
-
SSDEEP
24576:NpMWDhpLCcEoRDV/oRgHkORYTbdnOlhSRtREPPAYAOKqZ5Kymq5QRoTAN8pM/KUw:NmWeax/gg3oUTSREXKqiym+QfPkvZ
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-