General
-
Target
Solara.exe
-
Size
7.5MB
-
Sample
241003-zmh6dswclk
-
MD5
673dab1d9b1b23b97ab2f58f3b258c4d
-
SHA1
cba9235278308f729304907b50cb7d952f0c25d0
-
SHA256
18199cff951ecd0636980bcbcb0f9605a20337c94ec2753ccd451e0d89e87e97
-
SHA512
9a0b6d9a419f9b4697d75a4cc56908ef7634299e7063449dc51327618f0258c0a5fac0c26fbfc7ef0bdaf9b9ecf13d0ba41842034fec81f6844ffb17a1a09619
-
SSDEEP
196608:0pgVVE7UdwfI9jUC2gYBYv3vbW2+iITx1U6nb:rVVE1IH2gYBgDWJTnzb
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Solara.exe
-
Size
7.5MB
-
MD5
673dab1d9b1b23b97ab2f58f3b258c4d
-
SHA1
cba9235278308f729304907b50cb7d952f0c25d0
-
SHA256
18199cff951ecd0636980bcbcb0f9605a20337c94ec2753ccd451e0d89e87e97
-
SHA512
9a0b6d9a419f9b4697d75a4cc56908ef7634299e7063449dc51327618f0258c0a5fac0c26fbfc7ef0bdaf9b9ecf13d0ba41842034fec81f6844ffb17a1a09619
-
SSDEEP
196608:0pgVVE7UdwfI9jUC2gYBYv3vbW2+iITx1U6nb:rVVE1IH2gYBgDWJTnzb
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-