General
-
Target
solara_v3.exe
-
Size
108.3MB
-
Sample
241221-znnghazkgj
-
MD5
4655be9c3cfc4198eff46700691cf26e
-
SHA1
45a3478b19608bd3d8f995d35d5ab9bbad379179
-
SHA256
79d8b73fc1a3a280f6cb5fcfee4de9368e4627e097c610e3431df7e443baa4a7
-
SHA512
72210425f0eb70ea36710a9e988ec861a6da5b4fb29d463fe05ac12d142aa35aa9c9c3bbf75beea4ffa858d49e33ac445c5aeab892f08b6dc59fcc18a4e23131
-
SSDEEP
3145728:DUzeCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxNbyMjM:IzJjSWNa6NHCiWhieBF
Behavioral task
behavioral1
Sample
solara_v3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
solara_v3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
solara_v3.exe
-
Size
108.3MB
-
MD5
4655be9c3cfc4198eff46700691cf26e
-
SHA1
45a3478b19608bd3d8f995d35d5ab9bbad379179
-
SHA256
79d8b73fc1a3a280f6cb5fcfee4de9368e4627e097c610e3431df7e443baa4a7
-
SHA512
72210425f0eb70ea36710a9e988ec861a6da5b4fb29d463fe05ac12d142aa35aa9c9c3bbf75beea4ffa858d49e33ac445c5aeab892f08b6dc59fcc18a4e23131
-
SSDEEP
3145728:DUzeCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxNbyMjM:IzJjSWNa6NHCiWhieBF
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-