General
-
Target
SolaraV3.exe
-
Size
6.0MB
-
Sample
241004-ql2rnswdpm
-
MD5
7dd77a8611b56c1ed090293e3ab40f08
-
SHA1
1cb4be6453ab5dbeebd8339e0ec4264d6efa611c
-
SHA256
5d887dd72893e3bd40b291a1dc3ea2bc94f6d0daf4de318bd1005b57fbe114ca
-
SHA512
755ebb1e999ede433f4734552ca91677d33f9309993891435201ed04a539c1537bf80d4c6b45475a8b461ca235a92b27de0f07cfdeb84aaaa467407929523b2e
-
SSDEEP
196608:PrumWebTeOjmFwDRxtYSHdK34kdai7bN3m2EQca:KUK2pM9B3Q9w
Behavioral task
behavioral1
Sample
SolaraV3.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
SolaraV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
SolaraV3.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SolaraV3.exe
-
Size
6.0MB
-
MD5
7dd77a8611b56c1ed090293e3ab40f08
-
SHA1
1cb4be6453ab5dbeebd8339e0ec4264d6efa611c
-
SHA256
5d887dd72893e3bd40b291a1dc3ea2bc94f6d0daf4de318bd1005b57fbe114ca
-
SHA512
755ebb1e999ede433f4734552ca91677d33f9309993891435201ed04a539c1537bf80d4c6b45475a8b461ca235a92b27de0f07cfdeb84aaaa467407929523b2e
-
SSDEEP
196608:PrumWebTeOjmFwDRxtYSHdK34kdai7bN3m2EQca:KUK2pM9B3Q9w
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-