General
-
Target
O8KZQ_random.exe
-
Size
1.8MB
-
Sample
250126-qev1jsskdv
-
MD5
2272945e875fc0fc79b143ed11a13aba
-
SHA1
324c7fd172a233b53201b940850e122efc273265
-
SHA256
4edc969c801cd561015e5886b8ad225cfc3571913bfcc3e51f1729ecff002e14
-
SHA512
7c914e02dbdede0b75ffde48ced3db92fdfebeca86dfcf823269d83aedd27b6641e658a2a5f35e8c262449b745d3fcb28b5f5d7078ce6adbe9716781d8b46b4a
-
SSDEEP
49152:beaoOXFELy3Wi9LjTGIzVYETup+BJ3KRH7eaK2/:1ofAWojTGIpYEmg3GHq
Static task
static1
Behavioral task
behavioral1
Sample
O8KZQ_random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
O8KZQ_random.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Targets
-
-
Target
O8KZQ_random.exe
-
Size
1.8MB
-
MD5
2272945e875fc0fc79b143ed11a13aba
-
SHA1
324c7fd172a233b53201b940850e122efc273265
-
SHA256
4edc969c801cd561015e5886b8ad225cfc3571913bfcc3e51f1729ecff002e14
-
SHA512
7c914e02dbdede0b75ffde48ced3db92fdfebeca86dfcf823269d83aedd27b6641e658a2a5f35e8c262449b745d3fcb28b5f5d7078ce6adbe9716781d8b46b4a
-
SSDEEP
49152:beaoOXFELy3Wi9LjTGIzVYETup+BJ3KRH7eaK2/:1ofAWojTGIpYEmg3GHq
Score10/10-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2