General

  • Target

    solara.png

  • Size

    5KB

  • Sample

    240703-tzx77azcre

  • MD5

    b3d5c6d88c08fcafeefde059fd9d9b54

  • SHA1

    0b5be3ef1f45d6a6b3dc79a55faa350ba9c1cd0d

  • SHA256

    465fd258f124f640718c0727f39fbedd83f8f0585a9db0307c7c5a38bf092e85

  • SHA512

    c034b254ad0256fbbe49ed7ee3f0bbb53011508f04165c2b2058223d6720af5ab061e4dcf254356b19cf5fb6ea03fdcf5a5406bd7e7961c05391879be37f55d7

  • SSDEEP

    96:TCwK+RyfazbW82BYq5WXS0llxuQBZyTa5VYamTHxomSwZ72KHKXdx1HQnJ8O10oL:TSfazmLk7llxuQBHVz4HS42qEVoJ8Oqm

Score
7/10

Malware Config

Targets

    • Target

      solara.png

    • Size

      5KB

    • MD5

      b3d5c6d88c08fcafeefde059fd9d9b54

    • SHA1

      0b5be3ef1f45d6a6b3dc79a55faa350ba9c1cd0d

    • SHA256

      465fd258f124f640718c0727f39fbedd83f8f0585a9db0307c7c5a38bf092e85

    • SHA512

      c034b254ad0256fbbe49ed7ee3f0bbb53011508f04165c2b2058223d6720af5ab061e4dcf254356b19cf5fb6ea03fdcf5a5406bd7e7961c05391879be37f55d7

    • SSDEEP

      96:TCwK+RyfazbW82BYq5WXS0llxuQBZyTa5VYamTHxomSwZ72KHKXdx1HQnJ8O10oL:TSfazmLk7llxuQBHVz4HS42qEVoJ8Oqm

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks