General
-
Target
1463b4f295186260be7b70898e81f673926a7eea22cc4ca340ec3464b36f022e
-
Size
3.1MB
-
Sample
250106-ze36layrar
-
MD5
2f926994dcd9945ffed390e302aa8cbb
-
SHA1
4a8b9df036ad770333df6223dfd6c81d37a246b7
-
SHA256
1463b4f295186260be7b70898e81f673926a7eea22cc4ca340ec3464b36f022e
-
SHA512
ee3d8b225f1f176e6f05c538f4d04072780ebaa6e7c80faa69d7f3d101898ac3ac03c83148047de07b1b98511e992b8be44f8f47b28d1010a4447516ace1714c
-
SSDEEP
49152:RNzrSSSSSSSSSS0SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSkSSSVSa:RYzIZPRM55EgyoscaZ42ee1lN8
Static task
static1
Behavioral task
behavioral1
Sample
1463b4f295186260be7b70898e81f673926a7eea22cc4ca340ec3464b36f022e.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Extracted
lumma
https://wholersorie.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
Targets
-
-
Target
1463b4f295186260be7b70898e81f673926a7eea22cc4ca340ec3464b36f022e
-
Size
3.1MB
-
MD5
2f926994dcd9945ffed390e302aa8cbb
-
SHA1
4a8b9df036ad770333df6223dfd6c81d37a246b7
-
SHA256
1463b4f295186260be7b70898e81f673926a7eea22cc4ca340ec3464b36f022e
-
SHA512
ee3d8b225f1f176e6f05c538f4d04072780ebaa6e7c80faa69d7f3d101898ac3ac03c83148047de07b1b98511e992b8be44f8f47b28d1010a4447516ace1714c
-
SSDEEP
49152:RNzrSSSSSSSSSS0SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSkSSSVSa:RYzIZPRM55EgyoscaZ42ee1lN8
-
Lumma family
-
Modifies firewall policy service
-
Sality family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2