General
-
Target
SolaraBootstrapper.exe
-
Size
104.7MB
-
Sample
240805-s9fv8a1aqk
-
MD5
bdbf76228ee4c587b81885e011ce908d
-
SHA1
24219497fc9b0392558a433341c2220089318bb3
-
SHA256
675a635c4a4d1a5cb124600b4644f8126b3e5fbfc6e6a42488a664d14f9a6a2c
-
SHA512
637f6afc11062ccc0065f8db56fcb4a9c413b4338409f5042c41c4a74d478b5e9150bffcf201f12fa5687aeb271422f78c126cdc966a1949016be6b37516593b
-
SSDEEP
3145728:HZop8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWos9U:HZtSWNaIsHCiH1XcBW1
Malware Config
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
104.7MB
-
MD5
bdbf76228ee4c587b81885e011ce908d
-
SHA1
24219497fc9b0392558a433341c2220089318bb3
-
SHA256
675a635c4a4d1a5cb124600b4644f8126b3e5fbfc6e6a42488a664d14f9a6a2c
-
SHA512
637f6afc11062ccc0065f8db56fcb4a9c413b4338409f5042c41c4a74d478b5e9150bffcf201f12fa5687aeb271422f78c126cdc966a1949016be6b37516593b
-
SSDEEP
3145728:HZop8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWos9U:HZtSWNaIsHCiH1XcBW1
-
Enumerates VirtualBox DLL files
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
2