General
-
Target
SolaraBootstrapper.exe
-
Size
617KB
-
Sample
240806-x6zldayalp
-
MD5
ba3a75b046dca34cdc0eb91139ac3a6b
-
SHA1
7cb6f6cc53fbc1d34732005616360868038e51f9
-
SHA256
bf88cf4cc27b384d615ed9cf9468534c65f5336817d9f8c0695560380feda5b9
-
SHA512
6ee0c8947faa0db7a5ee523c3b8c3fd12d2bd45ba5a445ffffcf0f34606007ec3d257329473375fa30dff0e053d4e26b7aa5c574e1179a414f0dc93f1993eb98
-
SSDEEP
6144:45aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ5mUHo7EB9mxXTSj3A+8dwg:4OxPkPjQeqQ1Y53KR5ZH/9mxXR+jWC7I
Static task
static1
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
127.0.0.1:33700
21.ip.gl.ply.gg:33700
-
Install_directory
%Public%
-
install_file
solara.exe
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
617KB
-
MD5
ba3a75b046dca34cdc0eb91139ac3a6b
-
SHA1
7cb6f6cc53fbc1d34732005616360868038e51f9
-
SHA256
bf88cf4cc27b384d615ed9cf9468534c65f5336817d9f8c0695560380feda5b9
-
SHA512
6ee0c8947faa0db7a5ee523c3b8c3fd12d2bd45ba5a445ffffcf0f34606007ec3d257329473375fa30dff0e053d4e26b7aa5c574e1179a414f0dc93f1993eb98
-
SSDEEP
6144:45aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ5mUHo7EB9mxXTSj3A+8dwg:4OxPkPjQeqQ1Y53KR5ZH/9mxXR+jWC7I
-
Detect Umbral payload
-
Detect Xworm Payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-