General
-
Target
Solara.exe
-
Size
63KB
-
Sample
241225-yqndvavqbs
-
MD5
6c9fa73d768bca2a8caa6be510efef95
-
SHA1
0e86a3ce627b02263d1f9bd0a0e8d87f1014989f
-
SHA256
e97fee577801ecbaf43de7c1709734a498d5c1f472d0e00bdd12a06a3621adfc
-
SHA512
8b457bb7afe3ec80315dc041f66f873573d04a2aebc21adbdb4f0bafc5253534d212fdb8cdc7b9ed5630bfd05835f994dec5bdf859d473a127b29c08b6b95335
-
SSDEEP
768:ijwu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXneGr/SugdpqKYC:CrzV4dSJYUbdh9huugdpqKmY7
Malware Config
Extracted
asyncrat
Default
run-neither.gl.at.ply.gg:33834
-
delay
1
-
install
true
-
install_file
xdwdSystem32.exe
-
install_folder
%Temp%
Targets
-
-
Target
Solara.exe
-
Size
63KB
-
MD5
6c9fa73d768bca2a8caa6be510efef95
-
SHA1
0e86a3ce627b02263d1f9bd0a0e8d87f1014989f
-
SHA256
e97fee577801ecbaf43de7c1709734a498d5c1f472d0e00bdd12a06a3621adfc
-
SHA512
8b457bb7afe3ec80315dc041f66f873573d04a2aebc21adbdb4f0bafc5253534d212fdb8cdc7b9ed5630bfd05835f994dec5bdf859d473a127b29c08b6b95335
-
SSDEEP
768:ijwu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXneGr/SugdpqKYC:CrzV4dSJYUbdh9huugdpqKmY7
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-