General
-
Target
Solarasis.exe
-
Size
50.5MB
-
Sample
241129-29b2ps1paw
-
MD5
f65e2a4ca6f6da06ad6b5ab017e8f606
-
SHA1
8953d0ceef9e1bc6c54dfe5f0cac47879bdb2d1b
-
SHA256
1493e235477b9514f54ff420d0ab5d096e94dfcc885fcb5ac227ea3bc014acad
-
SHA512
0e99ac29ce6238d85d0ea69eeba2dba8e2577aac37c98cde7fc9c0d5a8b8aa278f150184f5657f6c8ffda758dcf0b24425d2ff28c051bb00cba33d88c87c8b9c
-
SSDEEP
1572864:vGGefWTsmTSk8IpG7V+VPhqb+VxTivfSlRISereyaAPeEV:uGaCsmTSkB05awb+Vxen+RXerXVPeEV
Behavioral task
behavioral1
Sample
Solarasis.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solarasis.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Solarasis.exe
-
Size
50.5MB
-
MD5
f65e2a4ca6f6da06ad6b5ab017e8f606
-
SHA1
8953d0ceef9e1bc6c54dfe5f0cac47879bdb2d1b
-
SHA256
1493e235477b9514f54ff420d0ab5d096e94dfcc885fcb5ac227ea3bc014acad
-
SHA512
0e99ac29ce6238d85d0ea69eeba2dba8e2577aac37c98cde7fc9c0d5a8b8aa278f150184f5657f6c8ffda758dcf0b24425d2ff28c051bb00cba33d88c87c8b9c
-
SSDEEP
1572864:vGGefWTsmTSk8IpG7V+VPhqb+VxTivfSlRISereyaAPeEV:uGaCsmTSkB05awb+Vxen+RXerXVPeEV
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-