General
-
Target
solara--main.zip
-
Size
277KB
-
Sample
250106-wjqvaavpck
-
MD5
7a5c5a912687566314128de1f0420926
-
SHA1
72c1c8c3ed7eb0cee01149a2e30e7d5b8129e05d
-
SHA256
62b9a1a71381bea2bf6de3b84412fec86fd698e2e8a0ebb0f00b0df622d4fec8
-
SHA512
937e4de662bc6239ab73f1a6271521238f40fb1e62f82ad5b14cf3e2b58f8e5b3cea5a56cd62a617158cf0dc179911dd95f82c4c0d0637b15f0d7266aafbac46
-
SSDEEP
6144:0ydMgcCFqLEPsuF7WpJxPPH4YLPmaMVVV/1EIQXm6QLc8hOVqX3:0aMgC/rJdxLDMVVV/1EIEm6l6O63
Static task
static1
Malware Config
Targets
-
-
Target
solara--main/BootstrapperV1.23 (1).exe
-
Size
800KB
-
MD5
02c70d9d6696950c198db93b7f6a835e
-
SHA1
30231a467a49cc37768eea0f55f4bea1cbfb48e2
-
SHA256
8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
-
SHA512
431d9b9918553bff4f4a5bc2a5e7b7015f8ad0e2d390bb4d5264d08983372424156524ef5587b24b67d1226856fc630aaca08edc8113097e0094501b4f08efeb
-
SSDEEP
12288:qhd8cjaLXVh84wEFkW1mocaBj6WtiRPpptHxQ0z:2ycjar84w5W4ocaBj6y2tHDz
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-