Overview
overview
10Static
static
10Solarasis.exe
windows7-x64
7Solarasis.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 22:04
Behavioral task
behavioral1
Sample
Solarasis.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Solarasis.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
Solarasis.exe
-
Size
81.1MB
-
MD5
b41e2edfeeeb3e677601e4502e594b41
-
SHA1
7df750c6f3d0402ed53b8c61b0d0956deefa428e
-
SHA256
793299d2d22a9849b67dec8735eb8fdb2ac6cdc763aadce73e84781c0c5a3f41
-
SHA512
ba50524a77d9f227430a1e96c9f1cc5ce8109c1f3b80032a682800ff815438e0ecfbbfdb20f037be2a94677698d6416edcf45c879d0b8268b58aa79c643cf812
-
SSDEEP
1572864:mGKlXebWTsmwSk8IpG7V+VPhqb+T9E7sliHiYgj+h58sMw5I8erchHQcJFg:3KRCCsmwSkB05awb+TZwZ5FderKJg
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2596 Solarasis.exe -
resource yara_rule behavioral1/files/0x0003000000020a85-1263.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2596 2184 Solarasis.exe 30 PID 2184 wrote to memory of 2596 2184 Solarasis.exe 30 PID 2184 wrote to memory of 2596 2184 Solarasis.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD58ea69ca2292c3af9cdb46dded91bc837
SHA172de7df68b2c336720d1528c34f21ff00ed7a2ce
SHA2563512c3a7ad74af034f51eba397c0e4716f592861ea3030745e8fd4dc8f9bca49
SHA512fb317bab11c922dc183d834b770e37e382b9cf3ab1ea95e9bca8d73ed1e23cc9ef2b6aea4a20d4637eba34276c81a6eee54b00cb146f825ef554d81387ae4ddc