General

  • Target

    Solara.exe

  • Size

    1005KB

  • Sample

    240830-xf3v4szfrm

  • MD5

    d1a6835f7934684efb8df6b6f2d8a9df

  • SHA1

    56f4e81d4663181f139e5b7b165e41611cbcc472

  • SHA256

    2b0521e21f41e110682b1871824451a9826a4ff2f5691d4e25186b36b0294146

  • SHA512

    c9e0557c3251c7a5d805c6e4047cee99949dab9a702e4e076e4ec0d9f0969b0210f4ca29c36ea7b4e15c43a70c7c076c0718df1b72bac057b2af7f3605f5908d

  • SSDEEP

    12288:xE5dY26i2vTGY1Dg6x7L1uq2/OBPQu43D8fPVle8IoaBcHl8ANTSwAlZw:x2r2yAPC8eRBcHl8gTSHXw

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1244807698026070016/Tfzk-_b80yPKERHasgSCWK64Pdjux3P8VTHXs1cSWpKcLSUecUTjKHtLyEEhA8jsiCW-

Extracted

Family

xworm

C2

grand-herbal.gl.at.ply.gg:53590

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Windows32.exe

Targets

    • Target

      Solara.exe

    • Size

      1005KB

    • MD5

      d1a6835f7934684efb8df6b6f2d8a9df

    • SHA1

      56f4e81d4663181f139e5b7b165e41611cbcc472

    • SHA256

      2b0521e21f41e110682b1871824451a9826a4ff2f5691d4e25186b36b0294146

    • SHA512

      c9e0557c3251c7a5d805c6e4047cee99949dab9a702e4e076e4ec0d9f0969b0210f4ca29c36ea7b4e15c43a70c7c076c0718df1b72bac057b2af7f3605f5908d

    • SSDEEP

      12288:xE5dY26i2vTGY1Dg6x7L1uq2/OBPQu43D8fPVle8IoaBcHl8ANTSwAlZw:x2r2yAPC8eRBcHl8gTSHXw

    • 44Caliber

      An open source infostealer written in C#.

    • Detect Xworm Payload

    • Modifies WinLogon for persistence

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks