General
-
Target
SolaraBeta.zip
-
Size
18.8MB
-
Sample
240602-rbzd8sfa86
-
MD5
94f8f240a1d29bb9f04af443c06bd8d1
-
SHA1
af6daa9c24e52c886cd4e08a251a1b76f54c00c0
-
SHA256
d8dc3d3c20bc6b29c8fbcc4c43684a590ef9def1a3307ceed5dfe37d187e1350
-
SHA512
49ddcc6b80be1f2ebf8cd270762bb3de8e2522e9ae6600bb89691db3a8bae4ac88530842513a178c99738a28ffd30bdcd28a56331fc92ddc5061eff980a98e6f
-
SSDEEP
393216:JhFJKZPnvYX/wAeuG2Vi8rVqwqo6VUmFkIUMBbl9xu9aOI:JwZAwAeuG1AqwzimIzBZ9
Static task
static1
Behavioral task
behavioral1
Sample
SolaraBeta/SolaraRelease.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
SolaraBeta/SolaraRelease.exe
-
Size
17.9MB
-
MD5
985a7c5f0ee35a1984ed8b0c18847643
-
SHA1
2bf0487f62ef4a521d3d51b01a4b8b2625de2a91
-
SHA256
15aa7b28eb003b5bfea6679de772a34e59372f2155a87ba8f05ce8c4118e2e3e
-
SHA512
9230cf00c8145e199586e478e7db307e75d729b98af24ec1b73e4893348380bd81affe436bee7aea8dc2e1b22d0b7e49af98428756a5832df22f5411e6e7a7d8
-
SSDEEP
393216:qtabzFXC2ZKqm6GhXcrRwBsoM8km9XWkdQctnGHS4sak:5blKqm6GmSBs12Gkd/tG
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
SolaraBeta/bin/incognito-luau.dll
-
Size
1.3MB
-
MD5
157fd035b2a344a94166d7db3756df0e
-
SHA1
f221d28c1deb80b4e8d9201226435aefce6b0f75
-
SHA256
8716c75aff75941711aff8770836f47eb9a254416089ef3571c6fc9a338b3009
-
SHA512
fad0174fbd22f58dd4fcdaad8378c214270b4faeaca64d9cb306f50e9316072a4c417c5723c4123b8bf94a3dba6ef4e3303ec60f4a2cf0c3a54d8ab375ea717d
-
SSDEEP
24576:ZqBSLRktEBl6blwTUMD4zB1VU2bFjYWR0pMQUAqLRAovh4bSAXVVRNRfMXZO:ZqBSLRkt8l6blSU//+2bFfvA1SQVVRNk
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4