Resubmissions

22-01-2025 18:40

250122-xbnwdszrbm 10

General

  • Target

    solaraV4.exe

  • Size

    7.6MB

  • Sample

    250122-xbnwdszrbm

  • MD5

    35e52f59088d0dbbb6fc0ada5816ddb8

  • SHA1

    3a2a54f4b308fd32395def0278786e4377353650

  • SHA256

    ea66aaf0913d415e67542ff147b5bedfa103b1c22c7c24e8557902e50fd77a78

  • SHA512

    474da9dd7c3dc14393059885aea1f7347ed3511330c3ebbd939d85cf0def8d116516ac35b6c9e2387e03e1570ea8e4e4c12e456b06ff2c5428785ef2b3ab4733

  • SSDEEP

    196608:CtD+kdyswfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWE:C5EIHL7HmBYXrYoaUND

Malware Config

Targets

    • Target

      solaraV4.exe

    • Size

      7.6MB

    • MD5

      35e52f59088d0dbbb6fc0ada5816ddb8

    • SHA1

      3a2a54f4b308fd32395def0278786e4377353650

    • SHA256

      ea66aaf0913d415e67542ff147b5bedfa103b1c22c7c24e8557902e50fd77a78

    • SHA512

      474da9dd7c3dc14393059885aea1f7347ed3511330c3ebbd939d85cf0def8d116516ac35b6c9e2387e03e1570ea8e4e4c12e456b06ff2c5428785ef2b3ab4733

    • SSDEEP

      196608:CtD+kdyswfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWE:C5EIHL7HmBYXrYoaUND

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��zL�.pyc

    • Size

      1KB

    • MD5

      6ed2f4ce7a249f7a040c2108371ae744

    • SHA1

      7f591d7244c3930274961c561c159208c0e898e5

    • SHA256

      06f1e1ed23cd3a7b47493bcd0e490344714b85685697bf8d84e3546dc62829e8

    • SHA512

      b82131e24f3815d954fd4dca63a5de9cd78b149847145005dc0464515d70b87e77d0b71dfbf1c5fba1be91bfe06d04c0e00ac31a04941180f21f143b04b2f080

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks