General
-
Target
Solara.exe
-
Size
253KB
-
Sample
240709-mmmgla1gre
-
MD5
9f3f506175ad4d9550bf1aea609694a7
-
SHA1
6cc35e30d5b40eb1b5d115feec12ec247a84193f
-
SHA256
7103785c72f15bc66849b927bb9b0030c2a8383a8f71cd4308b0b42055d8d467
-
SHA512
b4a691e3b679dac187f1219cff013d3e27a87d55bf10c4744b8aba969a0caac39922dbbf9bce454b87e3e685f5bfa9043ecabacca090650278ab2d081bc2d5cb
-
SSDEEP
6144:NloZM+rIkd8g+EtXHkv/iD4tTXCl38e1m2i8nUJfEm:PoZtL+EP8kda4mfE
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1260178339398684763/vrimjbksRiAdnQJhpf4RiMhDKhDPxfoJKYZ-ILxv3PIxTVVzEhCZeqgCy8f3wVpGOLPx
Targets
-
-
Target
Solara.exe
-
Size
253KB
-
MD5
9f3f506175ad4d9550bf1aea609694a7
-
SHA1
6cc35e30d5b40eb1b5d115feec12ec247a84193f
-
SHA256
7103785c72f15bc66849b927bb9b0030c2a8383a8f71cd4308b0b42055d8d467
-
SHA512
b4a691e3b679dac187f1219cff013d3e27a87d55bf10c4744b8aba969a0caac39922dbbf9bce454b87e3e685f5bfa9043ecabacca090650278ab2d081bc2d5cb
-
SSDEEP
6144:NloZM+rIkd8g+EtXHkv/iD4tTXCl38e1m2i8nUJfEm:PoZtL+EP8kda4mfE
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-