General

  • Target

    solara--main.zip

  • Size

    277KB

  • Sample

    250106-wjqvaavpck

  • MD5

    7a5c5a912687566314128de1f0420926

  • SHA1

    72c1c8c3ed7eb0cee01149a2e30e7d5b8129e05d

  • SHA256

    62b9a1a71381bea2bf6de3b84412fec86fd698e2e8a0ebb0f00b0df622d4fec8

  • SHA512

    937e4de662bc6239ab73f1a6271521238f40fb1e62f82ad5b14cf3e2b58f8e5b3cea5a56cd62a617158cf0dc179911dd95f82c4c0d0637b15f0d7266aafbac46

  • SSDEEP

    6144:0ydMgcCFqLEPsuF7WpJxPPH4YLPmaMVVV/1EIQXm6QLc8hOVqX3:0aMgC/rJdxLDMVVV/1EIEm6l6O63

Malware Config

Targets

    • Target

      solara--main/BootstrapperV1.23 (1).exe

    • Size

      800KB

    • MD5

      02c70d9d6696950c198db93b7f6a835e

    • SHA1

      30231a467a49cc37768eea0f55f4bea1cbfb48e2

    • SHA256

      8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3

    • SHA512

      431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb

    • SSDEEP

      12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks