General

  • Target

    SolaraBETA3.rar

  • Size

    14.3MB

  • Sample

    240509-vsdqmsdb7z

  • MD5

    a6d8949e3f607cdcc0dab3a8a238e392

  • SHA1

    cebd6a5f7119992718631c1c31dbeb836f60a8eb

  • SHA256

    168a76679d03d1e2e72cfc68f665ac3e9a498a8f1c3e603b808dd92723694c4f

  • SHA512

    71d6417939c535cc0dd6e60b1772d22c840d95977a662d3e18d8f7debde41cd5d343095ca14a7ccc6226b437c8c6c66127a1b2a2d99c053fcbf4ba7f18226d03

  • SSDEEP

    393216:G0RI7Li3FBN4K5aF6XCH/fy7yrcL4MErc7k/hPlvJ:G04Ak6Xwn54EMEok/hL

Malware Config

Targets

    • Target

      SolaraBETA3.rar

    • Size

      14.3MB

    • MD5

      a6d8949e3f607cdcc0dab3a8a238e392

    • SHA1

      cebd6a5f7119992718631c1c31dbeb836f60a8eb

    • SHA256

      168a76679d03d1e2e72cfc68f665ac3e9a498a8f1c3e603b808dd92723694c4f

    • SHA512

      71d6417939c535cc0dd6e60b1772d22c840d95977a662d3e18d8f7debde41cd5d343095ca14a7ccc6226b437c8c6c66127a1b2a2d99c053fcbf4ba7f18226d03

    • SSDEEP

      393216:G0RI7Li3FBN4K5aF6XCH/fy7yrcL4MErc7k/hPlvJ:G04Ak6Xwn54EMEok/hL

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks