General
-
Target
Solara.exe
-
Size
3.1MB
-
Sample
241208-tmha7sylc1
-
MD5
d80e76b6962401ba306ce0ce9adc43ef
-
SHA1
e607bd7cdecf84d80b28e67d2836ea882a4f771f
-
SHA256
9ad36e247204c18b819993885ea7a99fa5b142456a41494a9878cf45cfed2dde
-
SHA512
85881abbcb6260e9b327b4dcb4db98c24fbc3ca8ea731fb3b1b08c96dabc3745c8fdc778e0dd7f6a8049b24b44c3074b7fd93033dc5f0d7a793755b79ac5f866
-
SSDEEP
49152:uvRuf2NUaNmwzPWlvdaKM7ZxTwRJishuOar7ToGdXTHHB72eh2NT:uvsf2NUaNmwzPWlvdaB7ZxTwnruP
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Client
Synapsedoggystyle-51191.portmap.host:51191
192.168.68.107:4782
54e60454-c931-4922-b1b7-695913934b39
-
encryption_key
33F77912B4CF70A0AD1E582014B5294301E27672
-
install_name
AtlasX.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updator
-
subdirectory
SubDir
Targets
-
-
Target
Solara.exe
-
Size
3.1MB
-
MD5
d80e76b6962401ba306ce0ce9adc43ef
-
SHA1
e607bd7cdecf84d80b28e67d2836ea882a4f771f
-
SHA256
9ad36e247204c18b819993885ea7a99fa5b142456a41494a9878cf45cfed2dde
-
SHA512
85881abbcb6260e9b327b4dcb4db98c24fbc3ca8ea731fb3b1b08c96dabc3745c8fdc778e0dd7f6a8049b24b44c3074b7fd93033dc5f0d7a793755b79ac5f866
-
SSDEEP
49152:uvRuf2NUaNmwzPWlvdaKM7ZxTwRJishuOar7ToGdXTHHB72eh2NT:uvsf2NUaNmwzPWlvdaB7ZxTwnruP
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-