General
-
Target
SolaraV3.dll
-
Size
6.4MB
-
Sample
240811-ypwc3azbkb
-
MD5
00d1ec7ef2ab88125ce0bd43a3f62d33
-
SHA1
fde302f1421b94ae4b9e3aaa4cd4d65bcda40789
-
SHA256
7953e72cb972278e947c83c6a8bdcba35c7f2225566dd1b4fff686077cace832
-
SHA512
f56086204dc52a44ab35906a2c55dfe3d2418f8034e51664bcdefe44dd7b16a39d8f87dc0650f6e7e5f9d69ef88e1d4826bf2050cc69ecefd01d9bb958b4e8c6
-
SSDEEP
196608:SGMIUWMIaAKFHsairmB8tm/+YTN5uyezSnC+v3uBg:TRd4qairmBy0+eQyWR+vgg
Behavioral task
behavioral1
Sample
SolaraV3.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
SolaraV3.dll
-
Size
6.4MB
-
MD5
00d1ec7ef2ab88125ce0bd43a3f62d33
-
SHA1
fde302f1421b94ae4b9e3aaa4cd4d65bcda40789
-
SHA256
7953e72cb972278e947c83c6a8bdcba35c7f2225566dd1b4fff686077cace832
-
SHA512
f56086204dc52a44ab35906a2c55dfe3d2418f8034e51664bcdefe44dd7b16a39d8f87dc0650f6e7e5f9d69ef88e1d4826bf2050cc69ecefd01d9bb958b4e8c6
-
SSDEEP
196608:SGMIUWMIaAKFHsairmB8tm/+YTN5uyezSnC+v3uBg:TRd4qairmBy0+eQyWR+vgg
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-