Resubmissions

30-01-2025 23:51

250130-3wclraxrhk 10

30-01-2025 23:46

250130-3skg7awkfv 10

General

  • Target

    SolaraV2.zip

  • Size

    5.8MB

  • Sample

    250130-3wclraxrhk

  • MD5

    0e238fa1403884567fd91e0962bfed1f

  • SHA1

    5f570c49b37101137284f2f38efd3bebac51829c

  • SHA256

    d2aa5b8bf953de023285a000261d3fd7afd9a10c079aca0876989f3c27fc7dc4

  • SHA512

    f433fedaceebf24d4b96ffee100db42ba89b46f3de91be8b3de00a6585cede234509e9a291eebec4547b887bcf50119a96a2c1c142a9d4a8bfa464e4517584b2

  • SSDEEP

    98304:SyuTyj69U9cIkVvGNvc9Q69f3HyKpLfclYVyov+7T0AIt24QnU4C7/BVAP8ghfK2:ScgU9c1GNU9QQfHp7kYV9G7dIt427/BG

Malware Config

Targets

    • Target

      SolaraV2/Boostrapper.exe

    • Size

      5.9MB

    • MD5

      2aa55a1ec5740948a6a5a6799ba42cd1

    • SHA1

      e7edc8f044e1c400a822a2c8fa5a93040cb9ba2c

    • SHA256

      ac1d2d5e2b82530785810efd9dc7093a588a811665b540fbe89d74ab511dfaa6

    • SHA512

      84c84fc8deb4971dffe870b41fc810db7e47b30be4c7a22ab58d2ced228e339b8a2063f2f0bed3b1cba102326d61226ea3e8092cb1c5dd7fbffe2bda8a5a309f

    • SSDEEP

      98304:phmoDUN43Wlmc7jOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aftMwN:phumWlOjmFwDRxtYSHdK34kdai7bN3m5

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks