General
-
Target
Solara.exe
-
Size
91KB
-
Sample
240918-z4zjpstfqj
-
MD5
b4be3f19527e6c2b0065e742f9c1f838
-
SHA1
57156feb7c069cd31c939a8a0540e7d46e0c5427
-
SHA256
8f24c89391201e63ac570b9ace47eac4cac06157890056d7c09ac762d4c27cc1
-
SHA512
cbaaedd1ea1da87e86144058894e47b91a59c518e4a23c40d928d64f7fd542070c58d552e5e19e8640796967b4b4eb4106c11e6336f020f82ef90296861f327e
-
SSDEEP
1536:VMK650osONtFw9CuK6OOCtKiQ6Fm1AMtaqlzvgb1j5PMzk3Cletsy+q3:l+VscFw9CLOCXQOmu5KgBdPMzhetsDq3
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xworm
5.0
127.0.0.1:13970
accessories-retrieve.gl.at.ply.gg:13970
nipMTFYV6XUBvXZW
-
Install_directory
%AppData%
-
install_file
Loader.exe
Targets
-
-
Target
Solara.exe
-
Size
91KB
-
MD5
b4be3f19527e6c2b0065e742f9c1f838
-
SHA1
57156feb7c069cd31c939a8a0540e7d46e0c5427
-
SHA256
8f24c89391201e63ac570b9ace47eac4cac06157890056d7c09ac762d4c27cc1
-
SHA512
cbaaedd1ea1da87e86144058894e47b91a59c518e4a23c40d928d64f7fd542070c58d552e5e19e8640796967b4b4eb4106c11e6336f020f82ef90296861f327e
-
SSDEEP
1536:VMK650osONtFw9CuK6OOCtKiQ6Fm1AMtaqlzvgb1j5PMzk3Cletsy+q3:l+VscFw9CLOCXQOmu5KgBdPMzhetsDq3
-
Detect Xworm Payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1