General

  • Target

    solara.exe

  • Size

    5.0MB

  • Sample

    250223-b56gmstlgt

  • MD5

    490c2bb3790ac4202ab4ba700e2058a7

  • SHA1

    25de62792ba828dab9e74edf121bdf8e8ff0f0f2

  • SHA256

    d1a7c1e5ecdc4376b07913434048d2625def43e46504715a7a6600505319ad51

  • SHA512

    59fecb83e64abdc5da339cb1506832418ccf99d5c0bf5c46e2359b7f4674381784e3d621df0bebc107e17d728c8ec6ba672f5e5e88a7183c562541bb7a56d1bf

  • SSDEEP

    98304:FtNUK2yL5IrA3ocpcRDL+O14UndAtax4bmtQHgNByxuq4aX7lvECX+e0+Y:FzU5yt53oUIX+ggtax4bKQHgN/arpE4+

Malware Config

Extracted

Path

C:\Program Files (x86)\instructions_read_me.txt

Family

blackbasta

Ransom Note
ATTENTION! Your network has been breached and all data was encrypted. Please contact us at: https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/ Login ID: 7ab0444a-f73c-4ab0-b3a9-4c2ead84ecf1 *!* To access .onion websites download and install Tor Browser at: https://www.torproject.org/ (Tor Browser is not related to us) *!* To restore all your PCs and get your network working again, follow these instructions: - Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. It doesn't matter, who are trying to do this, either it will be your IT guys or a recovery agency. Please follow these simple rules to avoid data corruption: - Do not modify, rename or delete files. Any attempts to modify, decrypt or rename the files will lead to its fatal corruption. - Do not hire a recovery company. They can't decrypt without the key. They also don't care about your business. They believe that they are good negotiators, but it is not. They usually fail. So speak for yourself. Waiting you in a chat.
URLs

https://bastad5huzwkepdixedg2gekg7jk22ato24zyllp6lnjx7wdtyctgvyd.onion/

Targets

    • Target

      solara.exe

    • Size

      5.0MB

    • MD5

      490c2bb3790ac4202ab4ba700e2058a7

    • SHA1

      25de62792ba828dab9e74edf121bdf8e8ff0f0f2

    • SHA256

      d1a7c1e5ecdc4376b07913434048d2625def43e46504715a7a6600505319ad51

    • SHA512

      59fecb83e64abdc5da339cb1506832418ccf99d5c0bf5c46e2359b7f4674381784e3d621df0bebc107e17d728c8ec6ba672f5e5e88a7183c562541bb7a56d1bf

    • SSDEEP

      98304:FtNUK2yL5IrA3ocpcRDL+O14UndAtax4bmtQHgNByxuq4aX7lvECX+e0+Y:FzU5yt53oUIX+ggtax4bKQHgN/arpE4+

    • Black Basta

      A ransomware family targeting Windows and Linux ESXi first seen in February 2022.

    • Blackbasta family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks