General
-
Target
SolaraX.exe
-
Size
75KB
-
Sample
250301-3hlmhawqv8
-
MD5
bb4297c0a1be56440bc497fb1c276a82
-
SHA1
71db449f4de9b90906866b830ebdabc12c518c20
-
SHA256
7df7abdaaabc41cc080678e71723d5a3ef855abe8c154b87e39664640c8be48c
-
SHA512
a534e7f9107f226d127e0bc8472bb6d35c1eccfd38096ac13f1fb6aef885e52358e6766a604c735a50b0d8f2bb8c9b9bdf1f3e0fa418ccaed5eadadc504deab2
-
SSDEEP
1536:2MuQthAcx9+rFQCb9Hi/bWPUtb/UVbV6foaOirUpPyUS:7L9+rh0/bWPBVUROirUw3
Behavioral task
behavioral1
Sample
SolaraX.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
xworm
127.0.0.1:34930
minimum-ball.gl.at.ply.gg:34930
-
Install_directory
%AppData%
-
install_file
SolaraX.exe
Targets
-
-
Target
SolaraX.exe
-
Size
75KB
-
MD5
bb4297c0a1be56440bc497fb1c276a82
-
SHA1
71db449f4de9b90906866b830ebdabc12c518c20
-
SHA256
7df7abdaaabc41cc080678e71723d5a3ef855abe8c154b87e39664640c8be48c
-
SHA512
a534e7f9107f226d127e0bc8472bb6d35c1eccfd38096ac13f1fb6aef885e52358e6766a604c735a50b0d8f2bb8c9b9bdf1f3e0fa418ccaed5eadadc504deab2
-
SSDEEP
1536:2MuQthAcx9+rFQCb9Hi/bWPUtb/UVbV6foaOirUpPyUS:7L9+rh0/bWPBVUROirUw3
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1