General
-
Target
SolaraV2.zip
-
Size
5.8MB
-
Sample
250130-3wclraxrhk
-
MD5
0e238fa1403884567fd91e0962bfed1f
-
SHA1
5f570c49b37101137284f2f38efd3bebac51829c
-
SHA256
d2aa5b8bf953de023285a000261d3fd7afd9a10c079aca0876989f3c27fc7dc4
-
SHA512
f433fedaceebf24d4b96ffee100db42ba89b46f3de91be8b3de00a6585cede234509e9a291eebec4547b887bcf50119a96a2c1c142a9d4a8bfa464e4517584b2
-
SSDEEP
98304:SyuTyj69U9cIkVvGNvc9Q69f3HyKpLfclYVyov+7T0AIt24QnU4C7/BVAP8ghfK2:ScgU9c1GNU9QQfHp7kYV9G7dIt427/BG
Behavioral task
behavioral1
Sample
SolaraV2/Boostrapper.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
SolaraV2/Boostrapper.exe
-
Size
5.9MB
-
MD5
2aa55a1ec5740948a6a5a6799ba42cd1
-
SHA1
e7edc8f044e1c400a822a2c8fa5a93040cb9ba2c
-
SHA256
ac1d2d5e2b82530785810efd9dc7093a588a811665b540fbe89d74ab511dfaa6
-
SHA512
84c84fc8deb4971dffe870b41fc810db7e47b30be4c7a22ab58d2ced228e339b8a2063f2f0bed3b1cba102326d61226ea3e8092cb1c5dd7fbffe2bda8a5a309f
-
SSDEEP
98304:phmoDUN43Wlmc7jOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aftMwN:phumWlOjmFwDRxtYSHdK34kdai7bN3m5
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3