General
-
Target
Solara.exe
-
Size
45KB
-
Sample
241123-bj8pwatpcv
-
MD5
04f89f83ba27038601e2321b08d0b4ca
-
SHA1
edecd6d74ac90bbd235334ee17c2cae0ababa51b
-
SHA256
4d3101ba1ec70ddd04a30b6f04a67817920a6601e477339e5c135c167f6ab1e2
-
SHA512
04aece7190c9731d3a3528ef4b762eb47db6b50f670201dad4cd98c8bdf389eb1c8671488b550b02b28ae8ae61685ef0929b0a05273f09114b0e45269e4514bf
-
SSDEEP
768:fvn+LJZ2ny8BcGhsWc3cQHqGbgEbFEP89ObA6BOuh3zjjU:fHABTMmq6FN9UA6BOuFE
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
george-liechtenstein.gl.at.ply.gg:2030
OSPDmToN2pBX1fa2
-
Install_directory
%AppData%
-
install_file
Windows Defender.exe
Targets
-
-
Target
Solara.exe
-
Size
45KB
-
MD5
04f89f83ba27038601e2321b08d0b4ca
-
SHA1
edecd6d74ac90bbd235334ee17c2cae0ababa51b
-
SHA256
4d3101ba1ec70ddd04a30b6f04a67817920a6601e477339e5c135c167f6ab1e2
-
SHA512
04aece7190c9731d3a3528ef4b762eb47db6b50f670201dad4cd98c8bdf389eb1c8671488b550b02b28ae8ae61685ef0929b0a05273f09114b0e45269e4514bf
-
SSDEEP
768:fvn+LJZ2ny8BcGhsWc3cQHqGbgEbFEP89ObA6BOuh3zjjU:fHABTMmq6FN9UA6BOuFE
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-