General
-
Target
Solara
-
Size
14KB
-
Sample
240720-3laz6s1ajd
-
MD5
7320a47e529642f8a8a1db906737b4a7
-
SHA1
64adc95a896b2d896e5eb45ca1b5fa27a3b0282e
-
SHA256
639f9787d93bda50aefd07e6ef5a98695fade95074818e22a10481ec4e7d20ce
-
SHA512
b0f69efaec8a06f00c15881752a29c644103f52a58810dddf7a65a0b018a19ee334c8c9763ecd66249939d0927fd640c2fb8a4132d1b57fa9a852a1d33beb791
-
SSDEEP
384:BDn9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSia79:BD9TilUlC9fvOflS5/u01/8xWApJingA
Static task
static1
Malware Config
Targets
-
-
Target
Solara
-
Size
14KB
-
MD5
7320a47e529642f8a8a1db906737b4a7
-
SHA1
64adc95a896b2d896e5eb45ca1b5fa27a3b0282e
-
SHA256
639f9787d93bda50aefd07e6ef5a98695fade95074818e22a10481ec4e7d20ce
-
SHA512
b0f69efaec8a06f00c15881752a29c644103f52a58810dddf7a65a0b018a19ee334c8c9763ecd66249939d0927fd640c2fb8a4132d1b57fa9a852a1d33beb791
-
SSDEEP
384:BDn9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSia79:BD9TilUlC9fvOflS5/u01/8xWApJingA
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-