General
-
Target
SolaraB.rar
-
Size
5KB
-
Sample
240624-f9v9paycnb
-
MD5
b0bf490eeffd0865ab8cd515c6481045
-
SHA1
927fc43e6618c05bd8217d2ce57c48077d41d468
-
SHA256
e2f53b76060c0115efe12f3e6a8c2f0b27caed7a4d471b85d318b21de6cfe0c7
-
SHA512
99d985a286fff264e9c01b509d85cba16db8fb039dd0f340db686d62a4b7c31e561d4d8d0e3ee83a676c47665ac009ac027bdf32071bb1080ea4839cdd4ce7b3
-
SSDEEP
96:rAIVQw/rL3C/bqDiEuUkjRd0BVrKiFAyWgswkJUlilSQgNMesB:rrTYbokY7tlWgshULx+esB
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB/SolaraBootstrapper.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
SolaraB/SolaraBootstrapper.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xworm
anyone-blogging.gl.at.ply.gg:22284
-
Install_directory
%Userprofile%
-
install_file
XClient.exe
Targets
-
-
Target
SolaraB/SolaraBootstrapper.exe
-
Size
13KB
-
MD5
8be476fb431fcf11156417f410acf978
-
SHA1
55a19def82358ffc006487e1f49be04277e12bd5
-
SHA256
14cf7648123e018dcdfc2aa386135a0510a9f7b12b8bc125ad4e32fd7f16999c
-
SHA512
cf747947ff0bedf87230e0fa08ee534f44f08962a52ae3dd0c0d734d6f4131456a0e2dc1ac230fa6500d5b254a64cae9e01161d1a690e26794c38d66e22cb5ed
-
SSDEEP
192:IUxOQrGVa/nHU0LgJ2jaVb4+LHdrDXy3pifUJ1hHxrWjd:hIQaVafU0LmqaVb4+xPy5ifU1hRyj
-
Detect Xworm Payload
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1