General
-
Target
Sigmanly_7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69
-
Size
5.9MB
-
Sample
250105-nrdkxsvpdj
-
MD5
5b8011576b37d84db9122786cded9f55
-
SHA1
19cfa391040bae58c5d623f5515e1505996fe646
-
SHA256
7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69
-
SHA512
5eb25ca3129aa9ec0352864d8717355230bc9bbcb0a0c271197c2a4f6c72ef16c092772317440461e1d24d77fe3cafd5d1ab191d9e65690b18f8240fbd279021
-
SSDEEP
98304:hOz2MJHt7ylFablAuWSvn0n/5b0GC08A6PlATT9si+oc2pWwehjcuv03usdbQgST:SbxN+Qvn0nBb0N0pg2NZowcckAuKkVwL
Static task
static1
Behavioral task
behavioral1
Sample
Sigmanly_7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
Targets
-
-
Target
Sigmanly_7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69
-
Size
5.9MB
-
MD5
5b8011576b37d84db9122786cded9f55
-
SHA1
19cfa391040bae58c5d623f5515e1505996fe646
-
SHA256
7039e6fb048b2a7511b7095958332a7300cc42e66142b4c815f18cd02b6f1b69
-
SHA512
5eb25ca3129aa9ec0352864d8717355230bc9bbcb0a0c271197c2a4f6c72ef16c092772317440461e1d24d77fe3cafd5d1ab191d9e65690b18f8240fbd279021
-
SSDEEP
98304:hOz2MJHt7ylFablAuWSvn0n/5b0GC08A6PlATT9si+oc2pWwehjcuv03usdbQgST:SbxN+Qvn0nBb0N0pg2NZowcckAuKkVwL
-
Lumma family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-