General
-
Target
Solara.rar
-
Size
10.7MB
-
Sample
240912-y8z6cstbnh
-
MD5
4dee84b7303026ef481573d139086ad2
-
SHA1
d85c0a9a064815dff18a33a4c5e8ecbf4eee49df
-
SHA256
9c27c452ff1ebbcfbb34f1062ae68285892c58c6bc5dcdf326718e8d17045c61
-
SHA512
769d9123bc2049285c8dde3ed03e248c5189af4a0265f601521c1ff15b6949867a53ce64ec4e1412edc905c611c826016df92c15c9e55366cf349e034ec91832
-
SSDEEP
196608:yhxL3V5FXuVB3Ye+7pIPLS5n+JOgumvW7YGQsLItBrbDjoz0VGaTvkRS7:mzVbXaeg+0JTzltVbDzw68RS7
Static task
static1
Behavioral task
behavioral1
Sample
Solara.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solara.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/BootstrapperV1.18.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Solara/BootstrapperV1.18.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
Solara/RIVALS SCRIPT.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Solara/RIVALS SCRIPT.txt
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Solara.rar
-
Size
10.7MB
-
MD5
4dee84b7303026ef481573d139086ad2
-
SHA1
d85c0a9a064815dff18a33a4c5e8ecbf4eee49df
-
SHA256
9c27c452ff1ebbcfbb34f1062ae68285892c58c6bc5dcdf326718e8d17045c61
-
SHA512
769d9123bc2049285c8dde3ed03e248c5189af4a0265f601521c1ff15b6949867a53ce64ec4e1412edc905c611c826016df92c15c9e55366cf349e034ec91832
-
SSDEEP
196608:yhxL3V5FXuVB3Ye+7pIPLS5n+JOgumvW7YGQsLItBrbDjoz0VGaTvkRS7:mzVbXaeg+0JTzltVbDzw68RS7
Score3/10 -
-
-
Target
Solara/BootstrapperV1.18.exe
-
Size
11.2MB
-
MD5
7b7c9af10f65f91d0dfa704b47df1ab3
-
SHA1
56001ae93e167310c4c93e626599b2189717ab46
-
SHA256
06ec992467d151d23b2574124b6e7955087c3f32a684627acb8d505938bd1220
-
SHA512
1280660abf697fd92610224cd09b3b0db6539acea64bc715dc2605fb17a2be706c4595183744d4cb5b5781cb5aef7d5a2ad89a5bfdceb67f27b89921cd367582
-
SSDEEP
196608:gzzuYRi/rQvzqTYzbmP3zxfY1gD5MC7ZFWdaZSABYVNx6VyM70vEu:8uIizQrOemPDxg1qHs+EVNMyM708
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Solara/RIVALS SCRIPT.txt
-
Size
89B
-
MD5
13fbaf598afcb4c11235516a168b39b6
-
SHA1
e898cc6616217c11e46da49ef302191c7de371e6
-
SHA256
adec247fcf0e27cd1e5f533711fc43d6b172da44d483a400dd8e4a4addad1e28
-
SHA512
1eee8e2ce6ce6a1ac868a8112a4b611620c850b07aa3dddf397b621109ead352298511817deec3d5735080105577635cdd081bec90b10737fd590f523716ccad
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
2System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1