General
-
Target
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe
-
Size
1.8MB
-
Sample
250120-yerbcswjg1
-
MD5
2fb9171a01864310ecb8503f51eaa190
-
SHA1
be6c68d2c14e27cb1efd7947583d1410947bd6e8
-
SHA256
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7
-
SHA512
bf01687d1c28b979f6e31fa84605716cae91cb3b54a2d264567aeef9535503ddb435816bf117d0cc4324c68909eb22d13aa5b7976e072d67b159285d1f79249e
-
SSDEEP
49152:uxRHSVKV+h4Oihz/nCAyy9QSkEXrWNbI5f3r:uxRHSVqdd/CAdfT7SQ
Static task
static1
Behavioral task
behavioral1
Sample
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Targets
-
-
Target
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7N.exe
-
Size
1.8MB
-
MD5
2fb9171a01864310ecb8503f51eaa190
-
SHA1
be6c68d2c14e27cb1efd7947583d1410947bd6e8
-
SHA256
05098954b7299f980120fd3663787f7e02e4c3602a3728e1d3e28fbe4826aaf7
-
SHA512
bf01687d1c28b979f6e31fa84605716cae91cb3b54a2d264567aeef9535503ddb435816bf117d0cc4324c68909eb22d13aa5b7976e072d67b159285d1f79249e
-
SSDEEP
49152:uxRHSVKV+h4Oihz/nCAyy9QSkEXrWNbI5f3r:uxRHSVqdd/CAdfT7SQ
Score10/10-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2