General

  • Target

    Solara.exe

  • Size

    77.6MB

  • Sample

    240930-2ptq1ssfqd

  • MD5

    4313f2539fcae93cf5bb7481266d7659

  • SHA1

    e547ccd50010c3746292873ca7d64847f48bb350

  • SHA256

    4b87a7cbe4734e217eb2155f5362cbeb4d95947a241cb7d7effd75996330f8b3

  • SHA512

    80b16ab03f37aaa8d1948117cec20ff3bef00837465a7b024b23f8183e625643c2973d6088ec9d697f9a3335bce7f89cec268d1b5f3f93117cc3480004f0a95e

  • SSDEEP

    1572864:pvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:pvHcRVhmSkB05awFj8pnApu/7Uw93kO3

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      77.6MB

    • MD5

      4313f2539fcae93cf5bb7481266d7659

    • SHA1

      e547ccd50010c3746292873ca7d64847f48bb350

    • SHA256

      4b87a7cbe4734e217eb2155f5362cbeb4d95947a241cb7d7effd75996330f8b3

    • SHA512

      80b16ab03f37aaa8d1948117cec20ff3bef00837465a7b024b23f8183e625643c2973d6088ec9d697f9a3335bce7f89cec268d1b5f3f93117cc3480004f0a95e

    • SSDEEP

      1572864:pvHcRlnWSmSk8IpG7V+VPhqFxE7ulSpBBPiYweyJulZUdgD7UwayyOliH1O3:pvHcRVhmSkB05awFj8pnApu/7Uw93kO3

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks