General
-
Target
solara.exe
-
Size
31.2MB
-
Sample
240624-pe3jys1fpg
-
MD5
db574505e197fc696b7484a3f5a06bb0
-
SHA1
7cb74600a75354a787ff7964e5fe2b55f5cfe7f8
-
SHA256
81c43844d18eee0ff82671ed0235cd9081d62668fc6c5f338a70cdad48d38f3c
-
SHA512
76eb487866ed9c8bcaeb06775e254f69df27c0a6f300aebab698a4e20a5e25dd21c8d12ec1fe15b10cc15ee6353761457c50cb476f68ee3ba3fbe1b5e5b654ab
-
SSDEEP
786432:XCALehCHTZWhnaY6mpZbx7dt8CbTAq44A9riGotv7V0U30pBg4JYWTNOwUSfEt45:XhzZWhna50NZOCbTbpaeGotTVNT4eqNb
Static task
static1
Behavioral task
behavioral1
Sample
solara.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
solara.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1253312688864497665/375hzY1fiOjkE25L3-nbomdQUITdEzw5TbF9fCfxMycDpfz09qByG-R9KOpVUwhbMOaj
Targets
-
-
Target
solara.exe
-
Size
31.2MB
-
MD5
db574505e197fc696b7484a3f5a06bb0
-
SHA1
7cb74600a75354a787ff7964e5fe2b55f5cfe7f8
-
SHA256
81c43844d18eee0ff82671ed0235cd9081d62668fc6c5f338a70cdad48d38f3c
-
SHA512
76eb487866ed9c8bcaeb06775e254f69df27c0a6f300aebab698a4e20a5e25dd21c8d12ec1fe15b10cc15ee6353761457c50cb476f68ee3ba3fbe1b5e5b654ab
-
SSDEEP
786432:XCALehCHTZWhnaY6mpZbx7dt8CbTAq44A9riGotv7V0U30pBg4JYWTNOwUSfEt45:XhzZWhna50NZOCbTbpaeGotTVNT4eqNb
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2