General
-
Target
Solara.exe
-
Size
77.6MB
-
Sample
240930-2ptq1ssfqd
-
MD5
4313f2539fcae93cf5bb7481266d7659
-
SHA1
e547ccd50010c3746292873ca7d64847f48bb350
-
SHA256
4b87a7cbe4734e217eb2155f5362cbeb4d95947a241cb7d7effd75996330f8b3
-
SHA512
80b16ab03f37aaa8d1948117cec20ff3bef00837465a7b024b23f8183e625643c2973d6088ec9d697f9a3335bce7f89cec268d1b5f3f93117cc3480004f0a95e
-
SSDEEP
1572864:pvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:pvHcRVhmSkB05awFj8pnApu/7Uw93kO3
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Solara.exe
-
Size
77.6MB
-
MD5
4313f2539fcae93cf5bb7481266d7659
-
SHA1
e547ccd50010c3746292873ca7d64847f48bb350
-
SHA256
4b87a7cbe4734e217eb2155f5362cbeb4d95947a241cb7d7effd75996330f8b3
-
SHA512
80b16ab03f37aaa8d1948117cec20ff3bef00837465a7b024b23f8183e625643c2973d6088ec9d697f9a3335bce7f89cec268d1b5f3f93117cc3480004f0a95e
-
SSDEEP
1572864:pvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:pvHcRVhmSkB05awFj8pnApu/7Uw93kO3
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1