General
-
Target
SolaraB.rar
-
Size
76KB
-
Sample
240704-rtb2nazeqc
-
MD5
6411b4a9a246eef97e589a9df2882f8a
-
SHA1
1d90311acb334f288f4996df26b1800403a0948f
-
SHA256
c8615f0c7412de9bab6307491a5084aed1faf308664bc4d21e8d83101afdeb0a
-
SHA512
0199a12c1fdcdc0125e29d578e6111fb5cd3a51d5370c618fbeba138fe2c42e31418a611df7ead727f510b7da7a53e71f2c09c59850253d58ac07b5b658dcb4f
-
SSDEEP
1536:Ki2l3ISJ6HumuVjcjvlUiKFyTh7hxcj/Z1jY8LkoGFuQ3n:Ql3pJjmeQ5URyd7n8/Z1xozFugn
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1258158330237423708/TP4vZ1k1Rh4BbYP62cogAVNmLUNicORrL9xsgCelKxJelwVrWSmY1bVmhh1Yvxap5YQ-
Targets
-
-
Target
SolaraB/Solara/solarabootstrapper.exe
-
Size
227KB
-
MD5
ebf1358b8496d5c895f4b8f9298f7f96
-
SHA1
f0136d66bf877934376858064344c2038b998fd4
-
SHA256
bccba62c31f689715d01f4e80edbe2fe6a816edb571c4a409fccbe2d5b789b65
-
SHA512
ca82e5838c7e8b292f46e5b20684b7fbb861f449678fc6283bd5c587c0958c069800e94c9f65b239609434564a394f8ca168d83d40bc27c96ade6c18744beb6d
-
SSDEEP
6144:eloZMLrIkd8g+EtXHkv/iD46E6TjpaC9sop7mGz3/b8e1mZJi:IoZ0L+EP86E6TjpaC9sop7mGzLt
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-