General
-
Target
Solaragetfixed.exe
-
Size
59.0MB
-
Sample
241104-amka1sygkn
-
MD5
3af4d420b2882e9d579404daeaac1c13
-
SHA1
e7e17763d213dec2da0e690cbfaffa1ab23450d6
-
SHA256
619faf8eef2d2a1e70897371dc0afcf8f9c03499fda7870698bf4d4b17978845
-
SHA512
2c72dc6b2622448ad107c1b8b83ae20153924b8404f1f4a30e3bd6b35e246ff89c23771d120cc3c7a2bc7c7b5f71a28a1d2d5c1509450937ec3a35ca8093f303
-
SSDEEP
1572864:9GKlSUt2E7dsliEgiYgj+h58sMwtkcHH:8KltSwEi5J
Behavioral task
behavioral1
Sample
Solaragetfixed.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Solaragetfixed.exe
-
Size
59.0MB
-
MD5
3af4d420b2882e9d579404daeaac1c13
-
SHA1
e7e17763d213dec2da0e690cbfaffa1ab23450d6
-
SHA256
619faf8eef2d2a1e70897371dc0afcf8f9c03499fda7870698bf4d4b17978845
-
SHA512
2c72dc6b2622448ad107c1b8b83ae20153924b8404f1f4a30e3bd6b35e246ff89c23771d120cc3c7a2bc7c7b5f71a28a1d2d5c1509450937ec3a35ca8093f303
-
SSDEEP
1572864:9GKlSUt2E7dsliEgiYgj+h58sMwtkcHH:8KltSwEi5J
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1