General

  • Target

    Solara.exe

  • Size

    81.2MB

  • Sample

    240819-jafaza1ejh

  • MD5

    10d3cf93e2763c12e2cb1861157bd11c

  • SHA1

    3a2995e034de83a7a2007809d62898ff361135f8

  • SHA256

    9edec2d7604cd19e991c680524d372e23b6a56452b2c93b7a9ef45bbedaf47c6

  • SHA512

    c2ef4c4f63f5f47201daa7f9db8923e125297a86bbf93e8f355587a8c8febca60e689bb483de496441cc1d0ac6e65067c9eae696d6e575b4b32e21915e6ca5d4

  • SSDEEP

    1572864:YvxZQglPWjg7vaSk8IpG7V+VPhqHDE7jblgA7iYgj+h58sMw2IrD2:YvxZx9heSkB05awHaeA151

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      81.2MB

    • MD5

      10d3cf93e2763c12e2cb1861157bd11c

    • SHA1

      3a2995e034de83a7a2007809d62898ff361135f8

    • SHA256

      9edec2d7604cd19e991c680524d372e23b6a56452b2c93b7a9ef45bbedaf47c6

    • SHA512

      c2ef4c4f63f5f47201daa7f9db8923e125297a86bbf93e8f355587a8c8febca60e689bb483de496441cc1d0ac6e65067c9eae696d6e575b4b32e21915e6ca5d4

    • SSDEEP

      1572864:YvxZQglPWjg7vaSk8IpG7V+VPhqHDE7jblgA7iYgj+h58sMw2IrD2:YvxZx9heSkB05awHaeA151

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks