General

  • Target

    Solaragetfixed.exe

  • Size

    59.0MB

  • Sample

    241104-amka1sygkn

  • MD5

    3af4d420b2882e9d579404daeaac1c13

  • SHA1

    e7e17763d213dec2da0e690cbfaffa1ab23450d6

  • SHA256

    619faf8eef2d2a1e70897371dc0afcf8f9c03499fda7870698bf4d4b17978845

  • SHA512

    2c72dc6b2622448ad107c1b8b83ae20153924b8404f1f4a30e3bd6b35e246ff89c23771d120cc3c7a2bc7c7b5f71a28a1d2d5c1509450937ec3a35ca8093f303

  • SSDEEP

    1572864:9GKlSUt2E7dsliEgiYgj+h58sMwtkcHH:8KltSwEi5J

Malware Config

Targets

    • Target

      Solaragetfixed.exe

    • Size

      59.0MB

    • MD5

      3af4d420b2882e9d579404daeaac1c13

    • SHA1

      e7e17763d213dec2da0e690cbfaffa1ab23450d6

    • SHA256

      619faf8eef2d2a1e70897371dc0afcf8f9c03499fda7870698bf4d4b17978845

    • SHA512

      2c72dc6b2622448ad107c1b8b83ae20153924b8404f1f4a30e3bd6b35e246ff89c23771d120cc3c7a2bc7c7b5f71a28a1d2d5c1509450937ec3a35ca8093f303

    • SSDEEP

      1572864:9GKlSUt2E7dsliEgiYgj+h58sMwtkcHH:8KltSwEi5J

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks