Resubmissions

27-10-2024 13:58

241027-rach3swkej 10

27-10-2024 11:46

241027-nxnm3svlhk 10

General

  • Target

    Solara.exe

  • Size

    7.8MB

  • Sample

    241027-nxnm3svlhk

  • MD5

    95f2386ae3e4429f2a4a5ebdc1debdb8

  • SHA1

    9b9972251297aa592ccc1abbd6ada957ef831dac

  • SHA256

    02c5a79468f60a41ea9a6220444036e1da08471c5bb87de5e1e91c3504b198cb

  • SHA512

    9af023257e018259f5a504db664819efa04d2bb29b0958502f3c838deb79a7f3edcd210bc796b43e2e44d17bc212714894b97cd51ffca3ebf2415f39aad2b25e

  • SSDEEP

    196608:hK0WMeNTfm/pf+xk4dNSESRpmrbW3jmrK:Iy/pWu4m5RpmrbmyrK

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      7.8MB

    • MD5

      95f2386ae3e4429f2a4a5ebdc1debdb8

    • SHA1

      9b9972251297aa592ccc1abbd6ada957ef831dac

    • SHA256

      02c5a79468f60a41ea9a6220444036e1da08471c5bb87de5e1e91c3504b198cb

    • SHA512

      9af023257e018259f5a504db664819efa04d2bb29b0958502f3c838deb79a7f3edcd210bc796b43e2e44d17bc212714894b97cd51ffca3ebf2415f39aad2b25e

    • SSDEEP

      196608:hK0WMeNTfm/pf+xk4dNSESRpmrbW3jmrK:Iy/pWu4m5RpmrbmyrK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks