Resubmissions

11-10-2024 11:54

241011-n22eqs1bmc 10

11-10-2024 11:50

241011-nzlaqswaqr 10

11-10-2024 11:47

241011-nxyhaawakj 10

General

  • Target

    solara.exe

  • Size

    107.3MB

  • Sample

    241011-nxyhaawakj

  • MD5

    61ba61ab0be330d19e7805ab9c66e656

  • SHA1

    db7df8f1bf214798524c05495996245a06194d31

  • SHA256

    38fa1cbbaa4486bd800196c16d8047e2678dd1ded83b54e537692958f7ea9130

  • SHA512

    81632b52e702ab4080c8f1d0af240966301bb1349f39a569b9f299627195cca91c5a9eb8342915d70bdb686e971a26623d8db29a5f2f241b8d6f0109c0a49a04

  • SSDEEP

    3145728:PN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxZZE:1tJSWNa6NHCixiieB

Malware Config

Targets

    • Target

      solara.exe

    • Size

      107.3MB

    • MD5

      61ba61ab0be330d19e7805ab9c66e656

    • SHA1

      db7df8f1bf214798524c05495996245a06194d31

    • SHA256

      38fa1cbbaa4486bd800196c16d8047e2678dd1ded83b54e537692958f7ea9130

    • SHA512

      81632b52e702ab4080c8f1d0af240966301bb1349f39a569b9f299627195cca91c5a9eb8342915d70bdb686e971a26623d8db29a5f2f241b8d6f0109c0a49a04

    • SSDEEP

      3145728:PN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxZZE:1tJSWNa6NHCixiieB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks