General

  • Target

    main.zip

  • Size

    7.5MB

  • Sample

    241208-tplreaylgs

  • MD5

    6e0335c8c384a79afe820c634ab03061

  • SHA1

    321ca4b84e4f883d77b686760c8eb11f7c2366ca

  • SHA256

    cb4da3ff00eb081d23948fda4de28ab76086ade87dabbb0a58e830989316b9b3

  • SHA512

    63253c8fd91821d9c9a1d97ff2323b4fd8db1d7d46809ebd12e1bfc2bfefedaa7af2894dd25ce0b0640115ed12490f3d8d532111a75b834cafbcd4f090b4b3de

  • SSDEEP

    196608:u/rOhb8uFi0nxDVVU1WNQ2ohu1C6d6ZIHjjN6:dhbns0nxDcKXoo1FImjY

Malware Config

Targets

    • Target

      solara-new-main/Solara.exe

    • Size

      7.6MB

    • MD5

      2fc77369b819bc8e58930b4c96008bed

    • SHA1

      6e268c00e192220da943eaf6f92b2822d067444a

    • SHA256

      87c26ff3f978ff087bc4e8e920a765337998a523f1218cca58f0959db8f05533

    • SHA512

      aef8d25c10ca2b274c59a8a7ff130f18b216654d229e3806b6312ad1f26e43cb1febf22bd074542df704db1af06a3e2e2a9e3d993ff7cff5f60bf481fd18f063

    • SSDEEP

      196608:2V1NB6ylnlPzf+JiJCsmFMvGSEPn6hVvb:EBRlnlPSa7mmvzQ+D

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks