General

  • Target

    Solara-roblox-executor

  • Size

    302KB

  • Sample

    240813-q7r5csxcpa

  • MD5

    8bf88515c67f3e4eb4efe7b5b69598bf

  • SHA1

    b6d9940cc275e9077ef3490ccf2a1205d9c72f9b

  • SHA256

    6f2b606eae08aca489aaceed8cc91fbac1f9299e5c924ddeab15f9caaa2d79f3

  • SHA512

    8f6e03d69a27cf49415020a8d35765ab02df02c6bb1ce5b01e65863d0e527423a6e892a9e5bdb25faa35ceaf224c8d35674be7051866cdfd1c3fdf992d53f3fb

  • SSDEEP

    6144:x9o9J3uokeOvHS1d1+sNs8wbiWQW9mvZJT3CqbMrhryf65NRPaCieMjAkvCJv1V1:Do9J3uokeOvHS1d1+sNs8wbiWQW9mvZO

Malware Config

Targets

    • Target

      Solara-roblox-executor

    • Size

      302KB

    • MD5

      8bf88515c67f3e4eb4efe7b5b69598bf

    • SHA1

      b6d9940cc275e9077ef3490ccf2a1205d9c72f9b

    • SHA256

      6f2b606eae08aca489aaceed8cc91fbac1f9299e5c924ddeab15f9caaa2d79f3

    • SHA512

      8f6e03d69a27cf49415020a8d35765ab02df02c6bb1ce5b01e65863d0e527423a6e892a9e5bdb25faa35ceaf224c8d35674be7051866cdfd1c3fdf992d53f3fb

    • SSDEEP

      6144:x9o9J3uokeOvHS1d1+sNs8wbiWQW9mvZJT3CqbMrhryf65NRPaCieMjAkvCJv1V1:Do9J3uokeOvHS1d1+sNs8wbiWQW9mvZO

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks