General

  • Target

    SolaraV3.exe

  • Size

    4.6MB

  • Sample

    240927-jfs41s1hqp

  • MD5

    909af578e812e382bca46616c7ce91bf

  • SHA1

    40455c46866c3c0b0c83551c2850b59ed5b1a01f

  • SHA256

    4b27904c2cacecc5c69be9e9ecc0a07539bb9057c37275bf135083082fa1567c

  • SHA512

    c9ed851a8ae4138122c7f69ce19aad48d53b993219fccd907754b23cf567ecb104177e8c08738e03d281f38a541e88e24478ff8875444a7b39976f6b7e2d13bb

  • SSDEEP

    49152:keFdv/BfT34lc7kByfD+7xTAd1QcWlGqftEOkRQ7TGnAqrkmBngtaAJ6T+1QS/SF:kOZ/B8NcDeKalxnIpgIy6y4xvD7m

Malware Config

Targets

    • Target

      SolaraV3.exe

    • Size

      4.6MB

    • MD5

      909af578e812e382bca46616c7ce91bf

    • SHA1

      40455c46866c3c0b0c83551c2850b59ed5b1a01f

    • SHA256

      4b27904c2cacecc5c69be9e9ecc0a07539bb9057c37275bf135083082fa1567c

    • SHA512

      c9ed851a8ae4138122c7f69ce19aad48d53b993219fccd907754b23cf567ecb104177e8c08738e03d281f38a541e88e24478ff8875444a7b39976f6b7e2d13bb

    • SSDEEP

      49152:keFdv/BfT34lc7kByfD+7xTAd1QcWlGqftEOkRQ7TGnAqrkmBngtaAJ6T+1QS/SF:kOZ/B8NcDeKalxnIpgIy6y4xvD7m

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks