General

  • Target

    Solara.rar

  • Size

    19KB

  • Sample

    250221-sy2csavlfq

  • MD5

    d2e7b5441ca50d8484902c70cfab0633

  • SHA1

    2205a88efae8d741d6fd15468f3f450fc7aef5c4

  • SHA256

    478bdd7840cf305e0e2d6bf92df1fd60093a8aa9abe7138192baa928ef534782

  • SHA512

    513e5cd27087139eb457066205aca485123d6abcef20566c2d8bdd016f47c618ed1aabc8eae9e82f9fec56d6bb4f1233ad6b6557155a624d619dcdecbbca0ff4

  • SSDEEP

    384:MvtWzqM93GrEsd+WtFkOTnomVqS2esfrXhLgWCncrJCiTZp3xWar7:MvtkLuExW3GmVkDhYcVCi7h

Malware Config

Extracted

Family

xenorat

C2

192.168.1.6

Mutex

Roblox_service

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    49281

  • startup_name

    Solara.exe

Targets

    • Target

      Solara/Solara.exe

    • Size

      45KB

    • MD5

      901df622f506e27fd108384fffb83510

    • SHA1

      e716f966a198966198ce6a2d8b9960a46a3fe1d0

    • SHA256

      636403362b6d2e74f170a1c736920b4f0757148ab9c2b9c94a27f0ba178b2361

    • SHA512

      2b781377d8e205dfc86d019dc17e661e58a142a37d2b4fe30549ad369c3cc4b9690a796495081703df0e3bccc7c6e0be085b9558af277d26313409b22f2ed9da

    • SSDEEP

      768:qdhO/poiiUcjlJInAylF2I8H9Xqk5nWEZ5SbTDa4uI7CPW5A:Mw+jjgnvlF2I8H9XqcnW85SbT1uIY

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks