General
-
Target
6e70031f3a73f6af9375cb98e29921c8dce63844e9e8cd94319aba184f19ae69N.exe
-
Size
3.0MB
-
Sample
250108-sa1fkstpfv
-
MD5
72f8564f7e42b740696fdcdb792f6b10
-
SHA1
176d41c249f42c216ce6b531cc73221588201388
-
SHA256
6e70031f3a73f6af9375cb98e29921c8dce63844e9e8cd94319aba184f19ae69
-
SHA512
858046d78b53616b50b1f98a1ed7e75cbcaabc8ee9fda1e08c6be85c66570ff21d3a91ed6319a721d6b831d5a5296860e84fa26418688f97944844d40f9994a8
-
SSDEEP
49152:8SkbCn3iMUi6XMUhRKOgKPm0oIWOFgiEg0qTh1m+v4E9CH:x0Cn3iMUi/MYHWKIWO/ESDmE
Static task
static1
Behavioral task
behavioral1
Sample
6e70031f3a73f6af9375cb98e29921c8dce63844e9e8cd94319aba184f19ae69N.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://fancywaxxers.shop/api
Targets
-
-
Target
6e70031f3a73f6af9375cb98e29921c8dce63844e9e8cd94319aba184f19ae69N.exe
-
Size
3.0MB
-
MD5
72f8564f7e42b740696fdcdb792f6b10
-
SHA1
176d41c249f42c216ce6b531cc73221588201388
-
SHA256
6e70031f3a73f6af9375cb98e29921c8dce63844e9e8cd94319aba184f19ae69
-
SHA512
858046d78b53616b50b1f98a1ed7e75cbcaabc8ee9fda1e08c6be85c66570ff21d3a91ed6319a721d6b831d5a5296860e84fa26418688f97944844d40f9994a8
-
SSDEEP
49152:8SkbCn3iMUi6XMUhRKOgKPm0oIWOFgiEg0qTh1m+v4E9CH:x0Cn3iMUi/MYHWKIWO/ESDmE
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-