General

  • Target

    Solara.exe

  • Size

    107.3MB

  • Sample

    241011-qcv8jatdnc

  • MD5

    798f7a824214e2329d5d4ca474d7db66

  • SHA1

    b15f8864f4ffb0e552a832842286e6055201bf95

  • SHA256

    b32c77e3ac0029a200f28a72212e3f96198200760b8e3aaff94c2de36abfd95b

  • SHA512

    40f2684d5b41e2f1592e3969876e87e483ff0b2d515102befe0d3c993cfb6fb67eac1dec76aaeb14924e8bd5314423f3a8ec1d5e21a30c90780941d5d23c8973

  • SSDEEP

    3145728:JN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxARE:vtJSWNa6NHCixiieB

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      107.3MB

    • MD5

      798f7a824214e2329d5d4ca474d7db66

    • SHA1

      b15f8864f4ffb0e552a832842286e6055201bf95

    • SHA256

      b32c77e3ac0029a200f28a72212e3f96198200760b8e3aaff94c2de36abfd95b

    • SHA512

      40f2684d5b41e2f1592e3969876e87e483ff0b2d515102befe0d3c993cfb6fb67eac1dec76aaeb14924e8bd5314423f3a8ec1d5e21a30c90780941d5d23c8973

    • SSDEEP

      3145728:JN5L8iS6xjKcBa6/2qHO5i/p0nG0iWMstB2OxARE:vtJSWNa6NHCixiieB

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks