General

  • Target

    SolaraBootstrapper.exe

  • Size

    7.1MB

  • Sample

    240626-hwzq3avarj

  • MD5

    54f95f450352500a4b29ffcfd73321d3

  • SHA1

    191665dc5293c3936218d0bb7a6469781121cf4b

  • SHA256

    19eae6936192eec5f6c219f1c759646c73c7133137ab6297a84553c7c92ae203

  • SHA512

    25903a78e28d4ea37ad6a7bb623880a86464e0d163f9bbf1bb43b559316152e01de55d727c359f9d129946b93de75b17f5c4116ad31d2126c29fd7c8d812509a

  • SSDEEP

    196608:zhhDmMPuq//hu0LDdxgekzhdj+Ib1SBaeycFOOmi:9ZmUu+pu6xKvn5SBnt0i

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      7.1MB

    • MD5

      54f95f450352500a4b29ffcfd73321d3

    • SHA1

      191665dc5293c3936218d0bb7a6469781121cf4b

    • SHA256

      19eae6936192eec5f6c219f1c759646c73c7133137ab6297a84553c7c92ae203

    • SHA512

      25903a78e28d4ea37ad6a7bb623880a86464e0d163f9bbf1bb43b559316152e01de55d727c359f9d129946b93de75b17f5c4116ad31d2126c29fd7c8d812509a

    • SSDEEP

      196608:zhhDmMPuq//hu0LDdxgekzhdj+Ib1SBaeycFOOmi:9ZmUu+pu6xKvn5SBnt0i

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks