General
-
Target
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3cN.exe
-
Size
2.0MB
-
Sample
250225-jykklaypy6
-
MD5
7f5a456efaafee0c7fe2b8206b7d18f0
-
SHA1
8ef1e81c67dd873d3ea8aa5e750132a1dcf2660a
-
SHA256
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3c
-
SHA512
a187ff18370d1db5cc5990032d4662f7c8eb6c6e4fd57dea7a7572480713cadc99944296c8ecaa18629ea5de8678fb439805037b5fdd55458a8531ee8632c0bd
-
SSDEEP
49152:KxIHWDnPH6JC8pW4dEKiaou3k5LlnpVNzL6:KxIH8nPH6IKXsfa
Static task
static1
Behavioral task
behavioral1
Sample
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3cN.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
lumma
https://paleboreei.biz/api
Targets
-
-
Target
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3cN.exe
-
Size
2.0MB
-
MD5
7f5a456efaafee0c7fe2b8206b7d18f0
-
SHA1
8ef1e81c67dd873d3ea8aa5e750132a1dcf2660a
-
SHA256
2a6ea4f9674826161ef859c101bdf21c2b4a2410dc1a96894d07f1f442568d3c
-
SHA512
a187ff18370d1db5cc5990032d4662f7c8eb6c6e4fd57dea7a7572480713cadc99944296c8ecaa18629ea5de8678fb439805037b5fdd55458a8531ee8632c0bd
-
SSDEEP
49152:KxIHWDnPH6JC8pW4dEKiaou3k5LlnpVNzL6:KxIH8nPH6IKXsfa
Score10/10-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-