General

  • Target

    Solara.exe

  • Size

    7.8MB

  • Sample

    241027-g1zq7awanm

  • MD5

    95f2386ae3e4429f2a4a5ebdc1debdb8

  • SHA1

    9b9972251297aa592ccc1abbd6ada957ef831dac

  • SHA256

    02c5a79468f60a41ea9a6220444036e1da08471c5bb87de5e1e91c3504b198cb

  • SHA512

    9af023257e018259f5a504db664819efa04d2bb29b0958502f3c838deb79a7f3edcd210bc796b43e2e44d17bc212714894b97cd51ffca3ebf2415f39aad2b25e

  • SSDEEP

    196608:hK0WMeNTfm/pf+xk4dNSESRpmrbW3jmrK:Iy/pWu4m5RpmrbmyrK

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      7.8MB

    • MD5

      95f2386ae3e4429f2a4a5ebdc1debdb8

    • SHA1

      9b9972251297aa592ccc1abbd6ada957ef831dac

    • SHA256

      02c5a79468f60a41ea9a6220444036e1da08471c5bb87de5e1e91c3504b198cb

    • SHA512

      9af023257e018259f5a504db664819efa04d2bb29b0958502f3c838deb79a7f3edcd210bc796b43e2e44d17bc212714894b97cd51ffca3ebf2415f39aad2b25e

    • SSDEEP

      196608:hK0WMeNTfm/pf+xk4dNSESRpmrbW3jmrK:Iy/pWu4m5RpmrbmyrK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks