General
-
Target
Solara.exe
-
Size
81.2MB
-
Sample
240819-jafaza1ejh
-
MD5
10d3cf93e2763c12e2cb1861157bd11c
-
SHA1
3a2995e034de83a7a2007809d62898ff361135f8
-
SHA256
9edec2d7604cd19e991c680524d372e23b6a56452b2c93b7a9ef45bbedaf47c6
-
SHA512
c2ef4c4f63f5f47201daa7f9db8923e125297a86bbf93e8f355587a8c8febca60e689bb483de496441cc1d0ac6e65067c9eae696d6e575b4b32e21915e6ca5d4
-
SSDEEP
1572864:YvxZQglPWjg7vaSk8IpG7V+VPhqHDE7jblgA7iYgj+h58sMw2IrD2:YvxZx9heSkB05awHaeA151
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Solara.exe
-
Size
81.2MB
-
MD5
10d3cf93e2763c12e2cb1861157bd11c
-
SHA1
3a2995e034de83a7a2007809d62898ff361135f8
-
SHA256
9edec2d7604cd19e991c680524d372e23b6a56452b2c93b7a9ef45bbedaf47c6
-
SHA512
c2ef4c4f63f5f47201daa7f9db8923e125297a86bbf93e8f355587a8c8febca60e689bb483de496441cc1d0ac6e65067c9eae696d6e575b4b32e21915e6ca5d4
-
SSDEEP
1572864:YvxZQglPWjg7vaSk8IpG7V+VPhqHDE7jblgA7iYgj+h58sMw2IrD2:YvxZx9heSkB05awHaeA151
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-