Overview
overview
7Static
static
7SOLARA sol...gs.vbs
windows7-x64
1SOLARA sol...gs.vbs
windows10-2004-x64
1SOLARA sol...ol.exe
windows7-x64
7SOLARA sol...ol.exe
windows10-2004-x64
7SOLARA sol...it.exe
windows7-x64
4SOLARA sol...it.exe
windows10-2004-x64
4SOLARA sol...it.exe
windows7-x64
4SOLARA sol...it.exe
windows10-2004-x64
4SOLARA sol...up.exe
windows7-x64
6SOLARA sol...up.exe
windows10-2004-x64
6SOLARA sol...64.msi
windows7-x64
6SOLARA sol...64.msi
windows10-2004-x64
6SOLARA sol...64.exe
windows7-x64
7SOLARA sol...64.exe
windows10-2004-x64
7General
-
Target
SOLARA soluciones.rar
-
Size
114.4MB
-
Sample
240908-p7fwnazbnh
-
MD5
695064c2f7dd1d1e176d8c495768b3f6
-
SHA1
b836ba95ff94779106d62ffc0bc0cbf11a0b240a
-
SHA256
6bd0d676ab04b9918aa310d916686576eb7f81c321103dd5de3a74fd4612e489
-
SHA512
c2191a1f2910d259458b5a99291a5d85de300695c930ce2164aec5e8dab41ba39a43de6b358c06d3037f40aeb598bcee9fb2c3bf4b3bb0707ae9d846752a6c09
-
SSDEEP
3145728:IRlHTKMe16Rd/ZzVufef6lNumI+I70EG5MB6Ld:I3KMe8R3VwVlxILg5MMLd
Behavioral task
behavioral1
Sample
SOLARA soluciones/Desactivar Windows Defender/Defender_Settings.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SOLARA soluciones/Desactivar Windows Defender/Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
SOLARA soluciones/Desactivar Windows Defender/dControl.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SOLARA soluciones/Desactivar Windows Defender/dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SOLARA soluciones/Microsoft Visual C++ 32bit C++ 64Bit.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SOLARA soluciones/Microsoft Visual C++ 32bit C++ 64Bit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SOLARA soluciones/Microsoft Visual C++ 32bit.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SOLARA soluciones/Microsoft Visual C++ 32bit.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SOLARA soluciones/MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SOLARA soluciones/MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SOLARA soluciones/node-v20.12.2-x64.msi
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SOLARA soluciones/node-v20.12.2-x64.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
SOLARA soluciones/windowsdesktop-runtime-6.0.28-win-x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
SOLARA soluciones/windowsdesktop-runtime-6.0.28-win-x64.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SOLARA soluciones/Desactivar Windows Defender/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Score1/10 -
-
-
Target
SOLARA soluciones/Desactivar Windows Defender/dControl.exe
-
Size
447KB
-
MD5
58008524a6473bdf86c1040a9a9e39c3
-
SHA1
cb704d2e8df80fd3500a5b817966dc262d80ddb8
-
SHA256
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
-
SHA512
8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
SSDEEP
6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
SOLARA soluciones/Microsoft Visual C++ 32bit C++ 64Bit.exe
-
Size
24.2MB
-
MD5
a8a68bcc74b5022467f12587baf1ef93
-
SHA1
046f00c519900fcbf2e6e955fc155b11156a733b
-
SHA256
1ad7988c17663cc742b01bef1a6df2ed1741173009579ad50a94434e54f56073
-
SHA512
70a05bde549e5a973397cd77fe0c6380807cae768aa98454830f321a0de64bd0da30f31615ae6b4d9f0d244483a571e46024cf51b20fe813a6304a74bd8c0cc2
-
SSDEEP
393216:Dwlp+dkBSuF2SfUfn6+eDl2ugjMoA+hxV33wsBH+Jh+5l+BvlOchteAHYhx9vy:DMp+Ty2SfUfnxk/kpsjlOchcEu2
Score4/10 -
-
-
Target
SOLARA soluciones/Microsoft Visual C++ 32bit.exe
-
Size
13.2MB
-
MD5
9882a328c8414274555845fa6b542d1e
-
SHA1
ab4a97610b127d68c45311deabfbcd8aa7066f4b
-
SHA256
510fc8c2112e2bc544fb29a72191eabcc68d3a5a7468d35d7694493bc8593a79
-
SHA512
c08d1aa7e6e6215a0cee2793592b65668066c8c984b26675d2b8c09bc7fee21411cb3c0a905eaee7a48e7a47535fa777de21eeb07c78bca7bf3d7bb17192acf2
-
SSDEEP
196608:oRjgvJ2flpQcIIS/Rj7BWl+aV8t8z72BxBwBgO42BE6+2DQlMp1sHW5ZDmCCM0Xr:IgRIlptVYmfr7yBG/4pXMHsHW76CsGE
Score4/10 -
-
-
Target
SOLARA soluciones/MicrosoftEdgeWebview2Setup.exe
-
Size
1.6MB
-
MD5
8b9812ba27e12c79319d859e97955ca4
-
SHA1
3cb35ac811c27e7b21b381dccab55517609190c3
-
SHA256
a63d59b2af0c7b2be6984280386042a230dab928e3b426d51a0afb2eff5f98e9
-
SHA512
8312081fcca20f1d8d393ea2588c2fd19830eb9b36700ec8bc541cd25c4c2046008f3eec07883056956adae5c56083d43ded74d3122d21555d1e43a9d1ab5618
-
SSDEEP
24576:o9ye32wIdWoAH+miAQoCZoWf4fh29ht/5iqSxulBbxAl/f1scgIDnzMwdF9fZ4T+:Qye32wIuAAQZKwEqbBe1scgID7fZcZJ
Score6/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
SOLARA soluciones/node-v20.12.2-x64.msi
-
Size
25.3MB
-
MD5
0df081aa47e7159e585488a161a97466
-
SHA1
2dc9a592dbb208624aff11a57f97bea89a315973
-
SHA256
20c578361911d7b0cf153b293b025970eca383a2c802e0df438ac254aaca165d
-
SHA512
2e1b58add6a714281f2ddeb936069c0eb8ce24ae2e440941379c4273afd7f1a96b162d5b88211e8678804bad652e48c99a4993e0e0d0da4d1abd7550d397e836
-
SSDEEP
786432:wv0BuexnRXpx/JvPXYbt29ONMpUvcOoVclcx+DB0f9U8:HBuexnRZ/ytnNjoVcak0C
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
SOLARA soluciones/windowsdesktop-runtime-6.0.28-win-x64.exe
-
Size
54.8MB
-
MD5
dcb67d9bd74c6c8cb2d46c73e8d927f1
-
SHA1
31a3e538e83715271e0738ebe626772783eb558d
-
SHA256
cd16597df1d73eedd1f3d9b1247a98123c47a414365bb71a541b27f1b411b74b
-
SHA512
984ff5f50f0b59e1edde0926858ac63a5605ea9f2c3e55bdb4fe81aaa805f033a70e43474858187c0c3e7358d4dd9b06b8aea1fd1b15dd0d0c3fc9c1d20cbdaa
-
SSDEEP
1572864:rFt0Figp+hmLQ7bHoeBf/J98a9/SOk61PoDle8a:rFt08HhmM/H5f8KG61AD4/
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1