General

  • Target

    Solara.exe

  • Size

    7.6MB

  • Sample

    241208-tn781sylfw

  • MD5

    2fc77369b819bc8e58930b4c96008bed

  • SHA1

    6e268c00e192220da943eaf6f92b2822d067444a

  • SHA256

    87c26ff3f978ff087bc4e8e920a765337998a523f1218cca58f0959db8f05533

  • SHA512

    aef8d25c10ca2b274c59a8a7ff130f18b216654d229e3806b6312ad1f26e43cb1febf22bd074542df704db1af06a3e2e2a9e3d993ff7cff5f60bf481fd18f063

  • SSDEEP

    196608:2V1NB6ylnlPzf+JiJCsmFMvGSEPn6hVvb:EBRlnlPSa7mmvzQ+D

Malware Config

Targets

    • Target

      Solara.exe

    • Size

      7.6MB

    • MD5

      2fc77369b819bc8e58930b4c96008bed

    • SHA1

      6e268c00e192220da943eaf6f92b2822d067444a

    • SHA256

      87c26ff3f978ff087bc4e8e920a765337998a523f1218cca58f0959db8f05533

    • SHA512

      aef8d25c10ca2b274c59a8a7ff130f18b216654d229e3806b6312ad1f26e43cb1febf22bd074542df704db1af06a3e2e2a9e3d993ff7cff5f60bf481fd18f063

    • SSDEEP

      196608:2V1NB6ylnlPzf+JiJCsmFMvGSEPn6hVvb:EBRlnlPSa7mmvzQ+D

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks