General
-
Target
main.zip
-
Size
7.5MB
-
Sample
241208-tplreaylgs
-
MD5
6e0335c8c384a79afe820c634ab03061
-
SHA1
321ca4b84e4f883d77b686760c8eb11f7c2366ca
-
SHA256
cb4da3ff00eb081d23948fda4de28ab76086ade87dabbb0a58e830989316b9b3
-
SHA512
63253c8fd91821d9c9a1d97ff2323b4fd8db1d7d46809ebd12e1bfc2bfefedaa7af2894dd25ce0b0640115ed12490f3d8d532111a75b834cafbcd4f090b4b3de
-
SSDEEP
196608:u/rOhb8uFi0nxDVVU1WNQ2ohu1C6d6ZIHjjN6:dhbns0nxDcKXoo1FImjY
Behavioral task
behavioral1
Sample
solara-new-main/Solara.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
solara-new-main/Solara.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
solara-new-main/Solara.exe
-
Size
7.6MB
-
MD5
2fc77369b819bc8e58930b4c96008bed
-
SHA1
6e268c00e192220da943eaf6f92b2822d067444a
-
SHA256
87c26ff3f978ff087bc4e8e920a765337998a523f1218cca58f0959db8f05533
-
SHA512
aef8d25c10ca2b274c59a8a7ff130f18b216654d229e3806b6312ad1f26e43cb1febf22bd074542df704db1af06a3e2e2a9e3d993ff7cff5f60bf481fd18f063
-
SSDEEP
196608:2V1NB6ylnlPzf+JiJCsmFMvGSEPn6hVvb:EBRlnlPSa7mmvzQ+D
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3