General
-
Target
Solara_Bootstrap.7z
-
Size
372KB
-
Sample
241114-y48a6ssfln
-
MD5
880e181c6cdc2d64e6fc572ba391d972
-
SHA1
e04f52516b625f921cc5d8085bf15ea2a7211208
-
SHA256
4429897443b2487541fd7063992869780105c792b9c3903bdd93390a90941453
-
SHA512
fbd6693dc8ec29608dd0c05f202c415ce5a913dcf0f43ee319af63cbd2bd6531a8356c06b522834d676042d6c5bead0c5c7d803f7abefe49f3775070c91d0c5a
-
SSDEEP
768:dHnLIuj61JLn/TAg1WimhTLKnkgqgzZdPONqvzgs9086a4TTTTTTTTTTTTTTTTTb:dHLIia/JmTLKnkvgzZDLgs90tx
Static task
static1
Behavioral task
behavioral1
Sample
Solara_Bootstrap.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
-
install_file
System Volume Information Prefetch.exe
-
pastebin_url
https://pastebin.com/raw/ZpWEzbQr
Targets
-
-
Target
Solara_Bootstrap
-
Size
701.0MB
-
MD5
a4dea35bbfedaf715edf928c850f9062
-
SHA1
9d6fdbd7d96663b54c14182654a4742b11728743
-
SHA256
e5700337351ecb04be3ac19ab2875a2f810a42a11bc1c3a6cdfb6a20c021c346
-
SHA512
6cce303a11105bbab1a903549a6a830612b2a642b00d790065143eef5b3e7a494369a7bb330d6cd1a3988e00573d8785aad1a19dff798379b01dd7a8883d4297
-
SSDEEP
768:t45Ckp/PlWm8WHU6QVySGPoD81umA2SXCY5t2tzskOshCPwiE:/kpcml0fioQfGQ5sCht
-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-