General

  • Target

    Solara.exe

  • Size

    13.0MB

  • Sample

    240701-pf76tsvbjp

  • MD5

    bf624098d6433fa0e8cc2647bff1de00

  • SHA1

    cbadcd4a2766e3fdfb7a1996234edc2674a99427

  • SHA256

    fdaae99aded447eac2cc3091feaf973c52f11a5c98192b65128cd4ee26902dc3

  • SHA512

    7f44617e0ac1d9a7ef3fe80c5b285698d81df361ad40cb4d4085a6f07778a05f9383922f12d990962b928f4c019b094893b8c902f44bdddfa278be4615ddf617

  • SSDEEP

    393216:LAct+L01+l+uq+Vvj1+TtIiF90VQxOC7P6gM:LQ01+l+uqgvj1QtINHC7Pc

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      13.0MB

    • MD5

      bf624098d6433fa0e8cc2647bff1de00

    • SHA1

      cbadcd4a2766e3fdfb7a1996234edc2674a99427

    • SHA256

      fdaae99aded447eac2cc3091feaf973c52f11a5c98192b65128cd4ee26902dc3

    • SHA512

      7f44617e0ac1d9a7ef3fe80c5b285698d81df361ad40cb4d4085a6f07778a05f9383922f12d990962b928f4c019b094893b8c902f44bdddfa278be4615ddf617

    • SSDEEP

      393216:LAct+L01+l+uq+Vvj1+TtIiF90VQxOC7P6gM:LQ01+l+uqgvj1QtINHC7Pc

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks