General

  • Target

    SolaraBootstrapper.exe

  • Size

    7.6MB

  • Sample

    241129-yzwrksyldn

  • MD5

    86c79b9bf602824dfc1bbaa38d01d25e

  • SHA1

    8cfaed2028035d84d4e1f4c3b0f7ba74d51e51a1

  • SHA256

    1db9b3f057af39e38ad1d051b8b3f0ee98a82bc04f5555e143bee886816d80f1

  • SHA512

    78b11d84d89ad435ec33b5bf05b38b8493366b790f8ef810459e7608ff0665965aff7b4af690624808984415dd30e6f57aed9a6b383cb26e5528e311f630fb69

  • SSDEEP

    196608:6HHYAWFwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jP:HqIHziK1piXLGVE4Ue0VJD

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      7.6MB

    • MD5

      86c79b9bf602824dfc1bbaa38d01d25e

    • SHA1

      8cfaed2028035d84d4e1f4c3b0f7ba74d51e51a1

    • SHA256

      1db9b3f057af39e38ad1d051b8b3f0ee98a82bc04f5555e143bee886816d80f1

    • SHA512

      78b11d84d89ad435ec33b5bf05b38b8493366b790f8ef810459e7608ff0665965aff7b4af690624808984415dd30e6f57aed9a6b383cb26e5528e311f630fb69

    • SSDEEP

      196608:6HHYAWFwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jP:HqIHziK1piXLGVE4Ue0VJD

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks