General
-
Target
Solara.rar
-
Size
19KB
-
Sample
250221-sy2csavlfq
-
MD5
d2e7b5441ca50d8484902c70cfab0633
-
SHA1
2205a88efae8d741d6fd15468f3f450fc7aef5c4
-
SHA256
478bdd7840cf305e0e2d6bf92df1fd60093a8aa9abe7138192baa928ef534782
-
SHA512
513e5cd27087139eb457066205aca485123d6abcef20566c2d8bdd016f47c618ed1aabc8eae9e82f9fec56d6bb4f1233ad6b6557155a624d619dcdecbbca0ff4
-
SSDEEP
384:MvtWzqM93GrEsd+WtFkOTnomVqS2esfrXhLgWCncrJCiTZp3xWar7:MvtkLuExW3GmVkDhYcVCi7h
Behavioral task
behavioral1
Sample
Solara/Solara.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
192.168.1.6
Roblox_service
-
delay
5000
-
install_path
appdata
-
port
49281
-
startup_name
Solara.exe
Targets
-
-
Target
Solara/Solara.exe
-
Size
45KB
-
MD5
901df622f506e27fd108384fffb83510
-
SHA1
e716f966a198966198ce6a2d8b9960a46a3fe1d0
-
SHA256
636403362b6d2e74f170a1c736920b4f0757148ab9c2b9c94a27f0ba178b2361
-
SHA512
2b781377d8e205dfc86d019dc17e661e58a142a37d2b4fe30549ad369c3cc4b9690a796495081703df0e3bccc7c6e0be085b9558af277d26313409b22f2ed9da
-
SSDEEP
768:qdhO/poiiUcjlJInAylF2I8H9Xqk5nWEZ5SbTDa4uI7CPW5A:Mw+jjgnvlF2I8H9XqcnW85SbT1uIY
-
Detect XenoRat Payload
-
Xenorat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-