General

  • Target

    Solara3.exe

  • Size

    20.3MB

  • Sample

    240514-w14gpshh51

  • MD5

    bede0a5c8496bbec5149c8156e8fec85

  • SHA1

    dbb4e85de9f51d2e8c054c5d158ec68afd7a4909

  • SHA256

    dd471d8bfea5b83bfa9570386f1df7824b83d86e4edd0f59e10b92e4de20a2ad

  • SHA512

    c3108711a6a10a8cbbc173ced5ee8172e919da6182c26f53da47cfd15d834b557eaa289728021cb571614e905857ae3cb228b064e654dc8557b3ad9256cb1afb

  • SSDEEP

    393216:zEkZQtss27GjJWQsUcR4NzQW+eGQRg93iObIhRS/MLGrqT6oHd85Tv/:zhQtsAjYQFIW+e5R49MhR9qePy5T

Malware Config

Targets

    • Target

      Solara3.exe

    • Size

      20.3MB

    • MD5

      bede0a5c8496bbec5149c8156e8fec85

    • SHA1

      dbb4e85de9f51d2e8c054c5d158ec68afd7a4909

    • SHA256

      dd471d8bfea5b83bfa9570386f1df7824b83d86e4edd0f59e10b92e4de20a2ad

    • SHA512

      c3108711a6a10a8cbbc173ced5ee8172e919da6182c26f53da47cfd15d834b557eaa289728021cb571614e905857ae3cb228b064e654dc8557b3ad9256cb1afb

    • SSDEEP

      393216:zEkZQtss27GjJWQsUcR4NzQW+eGQRg93iObIhRS/MLGrqT6oHd85Tv/:zhQtsAjYQFIW+e5R49MhR9qePy5T

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks