General
-
Target
solara.png
-
Size
5KB
-
Sample
240703-tzx77azcre
-
MD5
b3d5c6d88c08fcafeefde059fd9d9b54
-
SHA1
0b5be3ef1f45d6a6b3dc79a55faa350ba9c1cd0d
-
SHA256
465fd258f124f640718c0727f39fbedd83f8f0585a9db0307c7c5a38bf092e85
-
SHA512
c034b254ad0256fbbe49ed7ee3f0bbb53011508f04165c2b2058223d6720af5ab061e4dcf254356b19cf5fb6ea03fdcf5a5406bd7e7961c05391879be37f55d7
-
SSDEEP
96:TCwK+RyfazbW82BYq5WXS0llxuQBZyTa5VYamTHxomSwZ72KHKXdx1HQnJ8O10oL:TSfazmLk7llxuQBHVz4HS42qEVoJ8Oqm
Static task
static1
Behavioral task
behavioral1
Sample
solara.png
Resource
win11-20240419-en
Malware Config
Targets
-
-
Target
solara.png
-
Size
5KB
-
MD5
b3d5c6d88c08fcafeefde059fd9d9b54
-
SHA1
0b5be3ef1f45d6a6b3dc79a55faa350ba9c1cd0d
-
SHA256
465fd258f124f640718c0727f39fbedd83f8f0585a9db0307c7c5a38bf092e85
-
SHA512
c034b254ad0256fbbe49ed7ee3f0bbb53011508f04165c2b2058223d6720af5ab061e4dcf254356b19cf5fb6ea03fdcf5a5406bd7e7961c05391879be37f55d7
-
SSDEEP
96:TCwK+RyfazbW82BYq5WXS0llxuQBZyTa5VYamTHxomSwZ72KHKXdx1HQnJ8O10oL:TSfazmLk7llxuQBHVz4HS42qEVoJ8Oqm
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-