General
-
Target
Sigmanly_d6cb7d9676cda25adb0dbfef2bc3467cd0c7ccdf8bf955688f7e2dddbc31a2f9
-
Size
1.7MB
-
Sample
250107-pf2daaspar
-
MD5
1b99c467986cf6d65d3c4d3ed83b0479
-
SHA1
701c4dc0099a78085e39599dca83dc3941f43eb7
-
SHA256
d6cb7d9676cda25adb0dbfef2bc3467cd0c7ccdf8bf955688f7e2dddbc31a2f9
-
SHA512
71ecda42151a00831bada7ab224abfcbad5ddbb2bee0a1beb30109abb77cdaab0ea2621d3ff1f249deababd6b00ed0a58751ae431506d678d9013f69c671d45c
-
SSDEEP
49152:K+ZdP2R3JyBkNO/40NrStnjDlCaAFH2Y+prj3Hi:5Ps3okdqrmoaK2N9S
Static task
static1
Behavioral task
behavioral1
Sample
Sigmanly_d6cb7d9676cda25adb0dbfef2bc3467cd0c7ccdf8bf955688f7e2dddbc31a2f9.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Targets
-
-
Target
Sigmanly_d6cb7d9676cda25adb0dbfef2bc3467cd0c7ccdf8bf955688f7e2dddbc31a2f9
-
Size
1.7MB
-
MD5
1b99c467986cf6d65d3c4d3ed83b0479
-
SHA1
701c4dc0099a78085e39599dca83dc3941f43eb7
-
SHA256
d6cb7d9676cda25adb0dbfef2bc3467cd0c7ccdf8bf955688f7e2dddbc31a2f9
-
SHA512
71ecda42151a00831bada7ab224abfcbad5ddbb2bee0a1beb30109abb77cdaab0ea2621d3ff1f249deababd6b00ed0a58751ae431506d678d9013f69c671d45c
-
SSDEEP
49152:K+ZdP2R3JyBkNO/40NrStnjDlCaAFH2Y+prj3Hi:5Ps3okdqrmoaK2N9S
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-