General
-
Target
Solara executor (infected).zip
-
Size
7.5MB
-
Sample
241022-j72kgawblb
-
MD5
17f1bcb3cad9aaec926a0a55520eacab
-
SHA1
ccb75f8e44a62fef1e8be2da44c8fbb29f678c1f
-
SHA256
e2c803a6e5688ae9fa69e72fc878773f828308da3e71dc46e9191ffe3b72d6f4
-
SHA512
391887063298af5b604d23cc4b9f346388351d4e7e4bce93285624eab3791320136dd100d7b3b0bf37f06d50f4eeb7924a4f2cdb27b2006e4b956c7874f2213b
-
SSDEEP
98304:E7cT9tEdoj8fnDNU1V72vB/eHbxLfozWoHLOzv/PlyEoncHgquK9X4YqZHHsPNwo:JxtE/S72pGH5I9HKonaXqYqRMjEwV
Malware Config
Targets
-
-
Target
Solara executor.exe
-
Size
7.6MB
-
MD5
194037c89b2580eba91b45ef58a1605f
-
SHA1
c1810dbcd42f1706bfb0c1944b206013279c3f64
-
SHA256
a5a6e9c77faad356479a191b6e4adf3ac64744604c303096f9212d730eec5c0c
-
SHA512
fcff768fa060a23fbe77c9efbc4da62df8264da9ed1b3afe187a050cb251a0623cdc877c2fb1adba6e5fc9a7bb6e5e96d1de3959c196f89a4cb4fc5794275010
-
SSDEEP
196608:blHYDwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j+:fIHziK1piXLGVE4Ue0VJK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-