General
-
Target
Solara Updated.exe
-
Size
76.3MB
-
Sample
240811-y4hqhszhkf
-
MD5
601494a09b6643debd3b6c52afd836e6
-
SHA1
a28296fa4400a73bc5df1173cc059674713d524c
-
SHA256
2e37a7c1b513ede8759d13fa479594f7541f652c8605e808dec035b0d09bc9b1
-
SHA512
38aed00c9cd96442f350a4b3b62e33a9f8e4e0a3352eb32670390181cfc48005e2c1f16c0b25f91579d55fecf9719b8a8a60bae996c636181e712c7de4241e02
-
SSDEEP
1572864:UvhQ6lm7vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDaSWDlZUmhA:Uvh14PSkB05awIxTy5nMHVLteSGXhA
Behavioral task
behavioral1
Sample
Solara Updated.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Solara Updated.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Solara Updated.exe
-
Size
76.3MB
-
MD5
601494a09b6643debd3b6c52afd836e6
-
SHA1
a28296fa4400a73bc5df1173cc059674713d524c
-
SHA256
2e37a7c1b513ede8759d13fa479594f7541f652c8605e808dec035b0d09bc9b1
-
SHA512
38aed00c9cd96442f350a4b3b62e33a9f8e4e0a3352eb32670390181cfc48005e2c1f16c0b25f91579d55fecf9719b8a8a60bae996c636181e712c7de4241e02
-
SSDEEP
1572864:UvhQ6lm7vDSk8IpG7V+VPhqIbE7WTylPj4iY4MHHLeqPNLtDaSWDlZUmhA:Uvh14PSkB05awIxTy5nMHVLteSGXhA
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1