General

  • Target

    solara.exe

  • Size

    2.8MB

  • Sample

    250412-sy2csaxm13

  • MD5

    d4ef72e55ee8d916a060dae174398888

  • SHA1

    92dc6ce33833a32e70d377bd6d66a17c0fd2369a

  • SHA256

    852a0e2b6016d2b2e0953c50e0985fe60320a70e73515cfea7706f86130a06ca

  • SHA512

    a814c8a43b4602888c9f12969f96c83c193528a7679ee8432da8f8e4b11a1379e35c4b07ad6cedec5e434d0b5ec7ad8124bbd6f3092fbcd0acc1b98fbb144f16

  • SSDEEP

    49152:G5wRNpPAI7CYItONjnwsp61qLJa2uQzdqYoqDLdS96A4zDziq2EJLFp2C/Xv:GaRvROYEQEqFajKoqDLgMAI2KLmC/X

Malware Config

Targets

    • Target

      solara.exe

    • Size

      2.8MB

    • MD5

      d4ef72e55ee8d916a060dae174398888

    • SHA1

      92dc6ce33833a32e70d377bd6d66a17c0fd2369a

    • SHA256

      852a0e2b6016d2b2e0953c50e0985fe60320a70e73515cfea7706f86130a06ca

    • SHA512

      a814c8a43b4602888c9f12969f96c83c193528a7679ee8432da8f8e4b11a1379e35c4b07ad6cedec5e434d0b5ec7ad8124bbd6f3092fbcd0acc1b98fbb144f16

    • SSDEEP

      49152:G5wRNpPAI7CYItONjnwsp61qLJa2uQzdqYoqDLdS96A4zDziq2EJLFp2C/Xv:GaRvROYEQEqFajKoqDLgMAI2KLmC/X

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks