General

  • Target

    solara_v3.exe

  • Size

    108.3MB

  • Sample

    241221-znnghazkgj

  • MD5

    4655be9c3cfc4198eff46700691cf26e

  • SHA1

    45a3478b19608bd3d8f995d35d5ab9bbad379179

  • SHA256

    79d8b73fc1a3a280f6cb5fcfee4de9368e4627e097c610e3431df7e443baa4a7

  • SHA512

    72210425f0eb70ea36710a9e988ec861a6da5b4fb29d463fe05ac12d142aa35aa9c9c3bbf75beea4ffa858d49e33ac445c5aeab892f08b6dc59fcc18a4e23131

  • SSDEEP

    3145728:DUzeCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxNbyMjM:IzJjSWNa6NHCiWhieBF

Malware Config

Targets

    • Target

      solara_v3.exe

    • Size

      108.3MB

    • MD5

      4655be9c3cfc4198eff46700691cf26e

    • SHA1

      45a3478b19608bd3d8f995d35d5ab9bbad379179

    • SHA256

      79d8b73fc1a3a280f6cb5fcfee4de9368e4627e097c610e3431df7e443baa4a7

    • SHA512

      72210425f0eb70ea36710a9e988ec861a6da5b4fb29d463fe05ac12d142aa35aa9c9c3bbf75beea4ffa858d49e33ac445c5aeab892f08b6dc59fcc18a4e23131

    • SSDEEP

      3145728:DUzeCRRS6xjKcBa6/2qHO5iCpBnG0iWMstB2OxNbyMjM:IzJjSWNa6NHCiWhieBF

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks