General
-
Target
SolaraB.exe
-
Size
50.0MB
-
Sample
240712-29ykpsxdjd
-
MD5
095aadf1d7b1a314f4577308fd30df39
-
SHA1
0449a25e1788a8231964526ba38171a98af71be8
-
SHA256
2e455f769e9d9123eaecab908c8a840c5a3bab500b8f37ebe1e54557ecb7b283
-
SHA512
42fee741b746e58c6c0cd6731f489e8dd68b22f883e61e0c17e694bedc36f80be56212c6f41a499e35a51d3bf9df33c9ee5f518cc05c4878c981435e3fdfd2c1
-
SSDEEP
1572864:W/jzr+3EvCpgD1qhO0z2vpiLQbh37b2lkD:A+z2D1qh/Jkbh37b2+D
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SolaraB.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
SolaraB.exe
-
Size
50.0MB
-
MD5
095aadf1d7b1a314f4577308fd30df39
-
SHA1
0449a25e1788a8231964526ba38171a98af71be8
-
SHA256
2e455f769e9d9123eaecab908c8a840c5a3bab500b8f37ebe1e54557ecb7b283
-
SHA512
42fee741b746e58c6c0cd6731f489e8dd68b22f883e61e0c17e694bedc36f80be56212c6f41a499e35a51d3bf9df33c9ee5f518cc05c4878c981435e3fdfd2c1
-
SSDEEP
1572864:W/jzr+3EvCpgD1qhO0z2vpiLQbh37b2lkD:A+z2D1qh/Jkbh37b2+D
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-