General
-
Target
Sigmanly_bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41
-
Size
6.8MB
-
Sample
250107-zajamayrfq
-
MD5
ec19fa1027fee164803cc127aef64199
-
SHA1
8a1c7cd16c432a67eb9d71fe745d5ce5e4315dfd
-
SHA256
bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41
-
SHA512
3f11ccce6a0b870e8596e24d2b91d492c8a7d6b6e8d5a0d868a0db90d03a76f0d1c91907bfe98e95d2542deceb39c66a5ce69114d980d61e5bcff4ec1a5c4a78
-
SSDEEP
98304:47RIWaDhDFxHWAW8+xfbZV1IucY8j8NHM3lngV++ZKHWywyfQmZ:4FItx3WhxFVgY88HM3NgV++Z2WuI+
Static task
static1
Behavioral task
behavioral1
Sample
Sigmanly_bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41.exe
Resource
win7-20241010-en
Malware Config
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
Targets
-
-
Target
Sigmanly_bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41
-
Size
6.8MB
-
MD5
ec19fa1027fee164803cc127aef64199
-
SHA1
8a1c7cd16c432a67eb9d71fe745d5ce5e4315dfd
-
SHA256
bb6ed22605e38edeea643fc3ef43ced73ba96cc3740f8e1d4332932a36d45a41
-
SHA512
3f11ccce6a0b870e8596e24d2b91d492c8a7d6b6e8d5a0d868a0db90d03a76f0d1c91907bfe98e95d2542deceb39c66a5ce69114d980d61e5bcff4ec1a5c4a78
-
SSDEEP
98304:47RIWaDhDFxHWAW8+xfbZV1IucY8j8NHM3lngV++ZKHWywyfQmZ:4FItx3WhxFVgY88HM3NgV++Z2WuI+
-
Lumma family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3