General

  • Target

    SolaraBootstrapper.exe

  • Size

    617KB

  • Sample

    240806-x6zldayalp

  • MD5

    ba3a75b046dca34cdc0eb91139ac3a6b

  • SHA1

    7cb6f6cc53fbc1d34732005616360868038e51f9

  • SHA256

    bf88cf4cc27b384d615ed9cf9468534c65f5336817d9f8c0695560380feda5b9

  • SHA512

    6ee0c8947faa0db7a5ee523c3b8c3fd12d2bd45ba5a445ffffcf0f34606007ec3d257329473375fa30dff0e053d4e26b7aa5c574e1179a414f0dc93f1993eb98

  • SSDEEP

    6144:45aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ5mUHo7EB9mxXTSj3A+8dwg:4OxPkPjQeqQ1Y53KR5ZH/9mxXR+jWC7I

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:33700

21.ip.gl.ply.gg:33700

Attributes
  • Install_directory

    %Public%

  • install_file

    solara.exe

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      617KB

    • MD5

      ba3a75b046dca34cdc0eb91139ac3a6b

    • SHA1

      7cb6f6cc53fbc1d34732005616360868038e51f9

    • SHA256

      bf88cf4cc27b384d615ed9cf9468534c65f5336817d9f8c0695560380feda5b9

    • SHA512

      6ee0c8947faa0db7a5ee523c3b8c3fd12d2bd45ba5a445ffffcf0f34606007ec3d257329473375fa30dff0e053d4e26b7aa5c574e1179a414f0dc93f1993eb98

    • SSDEEP

      6144:45aMJNLwL73PZPkFr1jilzqqVWk6855JKSFtIooEbQ5mUHo7EB9mxXTSj3A+8dwg:4OxPkPjQeqQ1Y53KR5ZH/9mxXR+jWC7I

    • Detect Umbral payload

    • Detect Xworm Payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks