General

  • Target

    SolaraV3.zip

  • Size

    10.8MB

  • Sample

    240814-ecgjlawdnf

  • MD5

    897c94869c99d3fcc9891f7f953313db

  • SHA1

    146ae19f7721f785e451c528339cbf765634d17e

  • SHA256

    0dc24f20d65afb0f237651888193be990f6328027875aba647db63fd8e51ce3c

  • SHA512

    03d7a373c4765a81bfebc1d54ea2f61080d2f9b7b6595109ef4973c08abfebe977bf481539aca1743cba23e09b5173032ceddd07ab4ef25d273f52556c773cd5

  • SSDEEP

    196608:BDKBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRbYIWKRrIWOzW0DaqkH1:dzY37v5tRvX+9/pWFGR0IBRrIWeRaDH1

Malware Config

Targets

    • Target

      SolaraV3/BoostrapperV1.16.exe

    • Size

      10.8MB

    • MD5

      76245fdac55a459587a98b5ad609be91

    • SHA1

      48efe630618023efe9d1056307c44c7b20b6cf37

    • SHA256

      8ca3de1aca5fb22918394df6f5fc8402c738fd3f03669b18b027d72ac2a8d22a

    • SHA512

      df0a5392d329a2fd81109604670c49413d63342eae91a94d413097bd2a2605fd1965ffbab6b2e367d06e6d0c1d2b7b416128e2bf01374f7835776596af449e2b

    • SSDEEP

      196608:XDKBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRbYIWKRrIWOzW0DaqkH:zzY37v5tRvX+9/pWFGR0IBRrIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      874KB

    • MD5

      8fc8d74e4194abe50c77392f4a28fd25

    • SHA1

      44da8f0194062f5c55c3d074ecdf35eac88f224c

    • SHA256

      ac1c0112d09abb04a8614ef722126d843a2455b2fb88a70c603eb50bf81e6382

    • SHA512

      28f80743f5bacddc32f79bf299b35b0e42ba5fb8ad95a0aabb3493af158e3b22e811e58abc1d7deb10620ed35888f96f5a2ab8b02e2ebdcbd78f0e3203db942f

    • SSDEEP

      24576:/eNheG6sydEQbDKWhad8n67VdKVmMSZO0s:/UQ2d1L4QOH

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks