General
-
Target
Sigmanly_77e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e
-
Size
1.8MB
-
Sample
250107-mk9jcaxlgz
-
MD5
c317f66c3bb595d92533e3d0fe227366
-
SHA1
ff7cf48fd32a6e4b73b14568c7610d585e5b40d3
-
SHA256
77e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e
-
SHA512
6415beacba6698451e4610799f99dacc4522f81e9dd60e65d076bc0910656cdc4e30115ff5242743f7d7bbbae851a0cc884a2da9e5cdea486011f748e7b9704a
-
SSDEEP
49152:6PK+ZDavbc8mfhKVdteGkKnEzKgJTeQH:6PK+6bcVfhKSKnEzKgJTxH
Static task
static1
Behavioral task
behavioral1
Sample
Sigmanly_77e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Targets
-
-
Target
Sigmanly_77e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e
-
Size
1.8MB
-
MD5
c317f66c3bb595d92533e3d0fe227366
-
SHA1
ff7cf48fd32a6e4b73b14568c7610d585e5b40d3
-
SHA256
77e2dd1562a40f41cea1d27cd0bf045c762372807813718327a6cae72c46731e
-
SHA512
6415beacba6698451e4610799f99dacc4522f81e9dd60e65d076bc0910656cdc4e30115ff5242743f7d7bbbae851a0cc884a2da9e5cdea486011f748e7b9704a
-
SSDEEP
49152:6PK+ZDavbc8mfhKVdteGkKnEzKgJTeQH:6PK+6bcVfhKSKnEzKgJTxH
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2