General

  • Target

    SolaraBeta.zip

  • Size

    18.8MB

  • Sample

    240602-rbzd8sfa86

  • MD5

    94f8f240a1d29bb9f04af443c06bd8d1

  • SHA1

    af6daa9c24e52c886cd4e08a251a1b76f54c00c0

  • SHA256

    d8dc3d3c20bc6b29c8fbcc4c43684a590ef9def1a3307ceed5dfe37d187e1350

  • SHA512

    49ddcc6b80be1f2ebf8cd270762bb3de8e2522e9ae6600bb89691db3a8bae4ac88530842513a178c99738a28ffd30bdcd28a56331fc92ddc5061eff980a98e6f

  • SSDEEP

    393216:JhFJKZPnvYX/wAeuG2Vi8rVqwqo6VUmFkIUMBbl9xu9aOI:JwZAwAeuG1AqwzimIzBZ9

Malware Config

Targets

    • Target

      SolaraBeta/SolaraRelease.exe

    • Size

      17.9MB

    • MD5

      985a7c5f0ee35a1984ed8b0c18847643

    • SHA1

      2bf0487f62ef4a521d3d51b01a4b8b2625de2a91

    • SHA256

      15aa7b28eb003b5bfea6679de772a34e59372f2155a87ba8f05ce8c4118e2e3e

    • SHA512

      9230cf00c8145e199586e478e7db307e75d729b98af24ec1b73e4893348380bd81affe436bee7aea8dc2e1b22d0b7e49af98428756a5832df22f5411e6e7a7d8

    • SSDEEP

      393216:qtabzFXC2ZKqm6GhXcrRwBsoM8km9XWkdQctnGHS4sak:5blKqm6GmSBs12Gkd/tG

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      SolaraBeta/bin/incognito-luau.dll

    • Size

      1.3MB

    • MD5

      157fd035b2a344a94166d7db3756df0e

    • SHA1

      f221d28c1deb80b4e8d9201226435aefce6b0f75

    • SHA256

      8716c75aff75941711aff8770836f47eb9a254416089ef3571c6fc9a338b3009

    • SHA512

      fad0174fbd22f58dd4fcdaad8378c214270b4faeaca64d9cb306f50e9316072a4c417c5723c4123b8bf94a3dba6ef4e3303ec60f4a2cf0c3a54d8ab375ea717d

    • SSDEEP

      24576:ZqBSLRktEBl6blwTUMD4zB1VU2bFjYWR0pMQUAqLRAovh4bSAXVVRNRfMXZO:ZqBSLRkt8l6blSU//+2bFfvA1SQVVRNk

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Browser Extensions

1
T1176

Privilege Escalation

Boot or Logon Autostart Execution

4
T1547

Registry Run Keys / Startup Folder

4
T1547.001

Defense Evasion

Modify Registry

7
T1112

Discovery

Query Registry

10
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

11
T1082

Command and Control

Web Service

1
T1102

Tasks