Resubmissions

14-10-2024 04:03

241014-embq4ayajg 6

14-10-2024 03:51

241014-eeykwsxgqf 6

12-10-2024 04:59

241012-fms6tavclg 9

General

  • Target

    Solara New Bootstrapper_70900263.exe

  • Size

    5.7MB

  • Sample

    241014-embq4ayajg

  • MD5

    0aa6945aee17c3eae75f48e715ee5eb7

  • SHA1

    b84977d612d1760f7a682e96dba9f7160cdaf72d

  • SHA256

    0b8be7d62ba830a3a53686afb8af57d1b2301d76c8b06759bf4b148d1e2ab6cc

  • SHA512

    8cdb467c92fefe0add78824acc496bf1c70c1eada04a801076073df92497660551c7b3c56a7d97a5ba74eb75879e5323f4b33ee51f94cab8c8afe6515056f5e5

  • SSDEEP

    98304:Vj8ab67Ht6RL8xpH4Tv7wPV6osBsBpPj7cZ+KCojTeEw98rqNkUi+bD:Vj8aatLPV6oPrke8rqN7

Malware Config

Targets

    • Target

      Solara New Bootstrapper_70900263.exe

    • Size

      5.7MB

    • MD5

      0aa6945aee17c3eae75f48e715ee5eb7

    • SHA1

      b84977d612d1760f7a682e96dba9f7160cdaf72d

    • SHA256

      0b8be7d62ba830a3a53686afb8af57d1b2301d76c8b06759bf4b148d1e2ab6cc

    • SHA512

      8cdb467c92fefe0add78824acc496bf1c70c1eada04a801076073df92497660551c7b3c56a7d97a5ba74eb75879e5323f4b33ee51f94cab8c8afe6515056f5e5

    • SSDEEP

      98304:Vj8ab67Ht6RL8xpH4Tv7wPV6osBsBpPj7cZ+KCojTeEw98rqNkUi+bD:Vj8aatLPV6oPrke8rqN7

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks