General

  • Target

    SolaraHelper.exe

  • Size

    22.8MB

  • Sample

    241123-q2ypysslbj

  • MD5

    b572c792f4d6eacc398b71fa24083cb9

  • SHA1

    70fa8db672641f8ac7bffb49f656a25c90006bc8

  • SHA256

    5c433743c2d265b35ac50e38783507378e5f5c2e4e5be0756695e9417c458801

  • SHA512

    eaed9296c07c9c839500490edfaa1f67e75e54655929f097e7e731b2a285dc88b07fba15855fcab2cb2520e59d695d8d913f7a370a4a9687d97242b2a63ef6b1

  • SSDEEP

    393216:+KSrtByxjgK+9/pWFlNBR9rH0Er2W673MH8:+K8tAjgK+9/pWPHAf38c

Malware Config

Targets

    • Target

      SolaraHelper.exe

    • Size

      22.8MB

    • MD5

      b572c792f4d6eacc398b71fa24083cb9

    • SHA1

      70fa8db672641f8ac7bffb49f656a25c90006bc8

    • SHA256

      5c433743c2d265b35ac50e38783507378e5f5c2e4e5be0756695e9417c458801

    • SHA512

      eaed9296c07c9c839500490edfaa1f67e75e54655929f097e7e731b2a285dc88b07fba15855fcab2cb2520e59d695d8d913f7a370a4a9687d97242b2a63ef6b1

    • SSDEEP

      393216:+KSrtByxjgK+9/pWFlNBR9rH0Er2W673MH8:+K8tAjgK+9/pWPHAf38c

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks