Overview
overview
10Static
static
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1api-ms-win...-0.dll
windows10-2004-x64
1mib.bin
windows7-x64
3mib.bin
windows10-2004-x64
3setup.exe
windows7-x64
1setup.exe
windows10-2004-x64
10setupact.log
windows7-x64
1setupact.log
windows10-2004-x64
1system.ini
windows7-x64
1system.ini
windows10-2004-x64
1General
-
Target
Solara_roblox.zip
-
Size
15.2MB
-
Sample
240727-pya9tazelq
-
MD5
325eaa719d119aa8a559410b7af339fd
-
SHA1
3fcad09ac80ab0e9c056eab70b55887ea4245df3
-
SHA256
3f767ffe96383bc3850ccecde867a3d4395b647947c9a3f004fbbc4894302136
-
SHA512
d76e0fd995621f9267aa5dd25e23bdcd2247fd3732f268f8afc2e382f703e009e97fbfa1022f3d69aa851a1e261267614d923ae2a311fe1177ea3b4036f77e35
-
SSDEEP
393216:C2qI4zgeCPIFiglX8Cw0777rnkmHueNS6gEPX+0ZrSZ+Y7:CXI3Iwg/f7kmDN9POoA
Static task
static1
Behavioral task
behavioral1
Sample
api-ms-win-core-console-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
api-ms-win-core-datetime-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
api-ms-win-core-debug-l1-1-0.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
mib.bin
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
mib.bin
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
setupact.log
Resource
win7-20240705-en
Behavioral task
behavioral9
Sample
setupact.log
Resource
win10v2004-20240704-en
Behavioral task
behavioral10
Sample
system.ini
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
system.ini
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
api-ms-win-core-console-l1-1-0.dll
-
Size
18KB
-
MD5
cde2424d99db56dd0d1eaf34811738c1
-
SHA1
cc7889c43729b93a4e193b2fd6ae5f22b6ad6b8f
-
SHA256
4ceaf28cadfd0929b44e9c686b93432a7151504c8ffe2a6afe516f9b16538131
-
SHA512
d5b8ef2de3fefde29b2c9cccb330c3076ba71d6ae29e1b34617057d8a832d37eae8e2f238e2abb6eb226453c00a835c669a7c03a00cd1698d02272d8eb6998e2
-
SSDEEP
192:MgWuufhW3a4V10b8uDBks/nGfe4pBjS7EQ8WebtuVaVWQ4eWbKqnajy3Snk0lpn:1W5hWq+10vq0GftpBj5fZblGinjXn
Score1/10 -
-
-
Target
api-ms-win-core-datetime-l1-1-0.dll
-
Size
17KB
-
MD5
acf4321ac8c8ff4d0442c799d621f8d9
-
SHA1
b12f87e6afc48697f1ce8b587715361e89b79cae
-
SHA256
69b84f7318798a91143e3d273ae9c0bedaabba930e3702447d493e2b8dd70725
-
SHA512
7878a7cd62f9d259a6bab05e13e9ac5b16437c0d8bda46e864f205465ae19531e5655d7547ae1594a53a05ddeb8b0c6058a73caeb21cd7c81fe5a424303d3bde
-
SSDEEP
192:hEWuufhWr2ivT16uDBks/nGfe4pBjSbGPKA8WebtuVaVWQ4mWOC9qnajjpxf9c98:aW5hWPvT1Nq0GftpBjjeZRC9lBLcT+
Score1/10 -
-
-
Target
api-ms-win-core-debug-l1-1-0.dll
-
Size
17KB
-
MD5
3c47c25b8141d20b2b4d576000000a61
-
SHA1
04543f9cdd847ff66389c9fd1e12b444dae6383a
-
SHA256
290030199e8b47d6bcf466f9fc81fee7e6aebc2c16a3f26dd77019f795658956
-
SHA512
c599ef06045583b28faac051909c28f5f2fa56c34d47f3bd49efc101a1cdcb571a298eb100d0b381e3ebb1ba19b2fb4dd5127f259eb8ab183753722ecbe0f10a
-
SSDEEP
384:M7eW5hWlo+10vq0GftpBj2uZwDkIldBQ7QMI:YkeinqDFQnI
Score1/10 -
-
-
Target
mib.bin
-
Size
42KB
-
MD5
23af90d2355d8c83aa4567ef1763b467
-
SHA1
08007f178be90ca8cb97de922ac4f8bf45691404
-
SHA256
c2bf719b19848fb90245a45a19160b479be8138ff17dc82ea38c5ee65d20097b
-
SHA512
ee1479bff096e4fcb3bdbb57eb08a51df971dd0e8d629f7b36b0758654ed2b3cc9969163b1bdcf2c8b3c276c20e5c24c000874c2ccbaea37e09ce690e5c44115
-
SSDEEP
384:crfecaVB5/5GGb6GrhMAIS5uQFRwv3e+prYTB1CT7XGOKMfGwfqI1Ie72XKB8bgS:crM/5GGTF5FFRi35prYH2GwlIPXIdG
Score3/10 -
-
-
Target
setup.exe
-
Size
52.5MB
-
MD5
4efe5b34754a7b87e7a2fb46664fb245
-
SHA1
7a2ffeac89d92fb0fb987cb6b284133e41a1e666
-
SHA256
88f6b132a2f2f4bee053e521ca9a212bca12ed681b223ad615d4263c976e152c
-
SHA512
a090deac29ae7aa7baf6411d1eef6121f5fdf09eb3d14f57f2b7e1f1f56859a70d12019234055c74df6e339081529c670bdf035c728244435ea8830b2d6f6b14
-
SSDEEP
393216:3T6KLdGUHM9yCKxECB54r6X9eDQrps7p6Y:3T6edGUs9yLEFy+sY
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
-
-
Target
setupact.log
-
Size
2KB
-
MD5
4c39556ae445b09a7c2a6f5e4b486fc5
-
SHA1
18f728d8667327f446949b801ddc40f9ce3bc2f5
-
SHA256
7558f2aac7807f786c3db87e9447a9529bdd3ecd5f4af2de9595effdc23d85f2
-
SHA512
1a9692a52ae41285a9902b293cefb20d3f475a1f493dc0ecdabbde390560e67a8d6ca00751ded3b99b265f8a4be311b165a299e69b2f6b73b6a95b00f11e17b4
Score1/10 -
-
-
Target
system.ini
-
Size
219B
-
MD5
286a9edb379dc3423a528b0864a0f111
-
SHA1
18db3e3dfb6b1d4dc9bc2226109112466de28db0
-
SHA256
6f533ccc79227e38f18bfc63bfc961ef4d3ee0e2bf33dd097ccf3548a12b743b
-
SHA512
588720a82941b44338196f1808b810fecbbc56cb9979628f1126048c28f80b946314092a8dd26f5e7aca234b7163c4b9c1283a65c9b36be2a4da9966feb8b2cb
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Discovery
Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
7System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1