General
-
Target
Solara.exe
-
Size
13.0MB
-
Sample
240701-pf76tsvbjp
-
MD5
bf624098d6433fa0e8cc2647bff1de00
-
SHA1
cbadcd4a2766e3fdfb7a1996234edc2674a99427
-
SHA256
fdaae99aded447eac2cc3091feaf973c52f11a5c98192b65128cd4ee26902dc3
-
SHA512
7f44617e0ac1d9a7ef3fe80c5b285698d81df361ad40cb4d4085a6f07778a05f9383922f12d990962b928f4c019b094893b8c902f44bdddfa278be4615ddf617
-
SSDEEP
393216:LAct+L01+l+uq+Vvj1+TtIiF90VQxOC7P6gM:LQ01+l+uqgvj1QtINHC7Pc
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
Solara.exe
-
Size
13.0MB
-
MD5
bf624098d6433fa0e8cc2647bff1de00
-
SHA1
cbadcd4a2766e3fdfb7a1996234edc2674a99427
-
SHA256
fdaae99aded447eac2cc3091feaf973c52f11a5c98192b65128cd4ee26902dc3
-
SHA512
7f44617e0ac1d9a7ef3fe80c5b285698d81df361ad40cb4d4085a6f07778a05f9383922f12d990962b928f4c019b094893b8c902f44bdddfa278be4615ddf617
-
SSDEEP
393216:LAct+L01+l+uq+Vvj1+TtIiF90VQxOC7P6gM:LQ01+l+uqgvj1QtINHC7Pc
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1