General
-
Target
Solara.zip
-
Size
504KB
-
Sample
250104-11dcqs1raj
-
MD5
fae457873d9a7a2d6b43ecde4d6052fb
-
SHA1
484cb23eccea31a7cf27bfaaf1c18a38c2c7e48e
-
SHA256
9de052d7b835e0b896644c23c696c5d31c78b6d5f5366ab46b9b368f18106e0c
-
SHA512
44dc52cc1f7efdf789f5dc87d107c7637279c8b54429c2da4f2bd87e2a077d9c5b9331fcbd11b4aef622e609f1421388297df2978ed1a22e116262f46131939a
-
SSDEEP
12288:Gp+PYp9k7GljQzhHWPHIdL4nAOhdnsqjhcoh/uzD9wl1Nd+u3w:TPhHbMAOhF16z9wl1Nd+ug
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
config.js
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
lua.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
lua51.dll
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Launcher.bat
-
Size
2KB
-
MD5
a8883d531fc8b94f0ce002b1bc607d1d
-
SHA1
7f52ffa1e9fab82955dfe3cbb04714b85a4990ac
-
SHA256
cc5480ea61441b4112dfbbb04402e91b0abb7d64ca4461b5c8a46b063bb33e9e
-
SHA512
789d3a4161d1ea4d72dd2c9c56fb8b135bc5d613c69e328aeef0c4e1fdd9191dc89f2d819d925e7878baef282120a3c481cffc762ba923a925eeea21da0a62f6
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (566) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
-
-
Target
config.txt
-
Size
220KB
-
MD5
96c673c9e9dedefec5fd5e27284e4f29
-
SHA1
1b5865f8998749a1fd61f62e6357d19dedcc9a2c
-
SHA256
d92b9e01e24935e1cc6144734c0b39379edef1e3c06aedbd547dc304e7334d77
-
SHA512
4ac805e8528f1003911960ce317150d186022a30dc31c479a54e1f6adbbf9cbce882da4b46f8cf0991c9e07fb4239f970d07c1538e4d16c79b560b5b272e5b83
-
SSDEEP
3072:ubmjIIxdmqlnRf1/QyZs2WWwjojiS06SK9J8Iq8jltsBo0FXnihq/+43j:uBCdFllFLsSok9Jg4lutNb+4T
Score3/10 -
-
-
Target
lua.exe
-
Size
89KB
-
MD5
dd98a43cb27efd5bcc29efb23fdd6ca5
-
SHA1
38f621f3f0df5764938015b56ecfa54948dde8f5
-
SHA256
1cf20b8449ea84c684822a5e8ab3672213072db8267061537d1ce4ec2c30c42a
-
SHA512
871a2079892b1eb54cb761aebd500ac8da96489c3071c32a3dab00200f74f4e12b9ab6c62623c53aea5b8be3fc031fb1b3e628ffe15d73323d917083240742b0
-
SSDEEP
1536:Ee7h7q/J6K3nHC+AGUob2f0DBFPbPWNPWp350NHcHkDsWqxcd2ZPSAv:Ee7oU8HC+AGUu2abPbPWQpO8E0A2tSAv
Score3/10 -
-
-
Target
lua51.dll
-
Size
592KB
-
MD5
3dff7448b43fcfb4dc65e0040b0ffb88
-
SHA1
583cdab08519d99f49234965ffd07688ccf52c56
-
SHA256
ff976f6e965e3793e278fa9bf5e80b9b226a0b3932b9da764bffc8e41e6cdb60
-
SHA512
cdcbe0ec9ddd6b605161e3c30ce3de721f1333fce85985e88928086b1578435dc67373c3dc3492ed8eae0d63987cac633aa4099b205989dcbb91cbbfc8f6a394
-
SSDEEP
12288:rs7/mj/73RaLHIW5BmUeUhoE4RgiF1q1bPIBKsg4Db0S:rc/u/7IoRnUKfq1Dl4DY
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1