Overview
overview
10Static
static
3Solara/Deb...on.dll
windows10-2004-x64
1Solara/Deb...er.dll
windows10-2004-x64
1Solara/Deb...ce.dll
windows10-2004-x64
1Solara/Pac...ce.dll
windows10-2004-x64
1Solara/Solara.exe
windows10-2004-x64
10Solara/acc...pl.dll
windows10-2004-x64
1Solara/oleprn.dll
windows10-2004-x64
1Solara/wwancfg.dll
windows10-2004-x64
1Analysis
-
max time kernel
105s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
Solara/Debug/Addition.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Solara/Debug/Helper.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Solara/Debug/Resource.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
Solara/Packaged/Resource.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
Solara/Solara.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
Solara/accessibilitycpl.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
Solara/oleprn.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
Solara/wwancfg.dll
Resource
win10v2004-20250410-en
General
-
Target
Solara/Solara.exe
-
Size
432KB
-
MD5
3ad28512794a4e91397f2903543e7220
-
SHA1
514e414f6bbcf4fc4991d4df3b48d66c6c8efa8a
-
SHA256
115c0569f04cd121172cb2b7689a67715db4f7e33cb2c0a04eaa4de59078293b
-
SHA512
f1dc4a8f6d69cc9589e2dea82aca91c3f46da1d322e0138862d9be3ccd6754c8624cb77b37d8884f7402cc1c747845f10993aa80ac9b50e2f19feaac9589e3a6
-
SSDEEP
6144:yzEo3MgLXCbN91YdOnCjhIoCQ8uUiEXJTUfs5wOSzmaq55SeFrLVNaG:TQMgAjCaoguvE59uzmaqnx/
Malware Config
Extracted
rhadamanthys
https://135.181.4.162:2423/97e9fc994198e76/5vasbsn8.w2nxs
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1844 set thread context of 5956 1844 Solara.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 4972 1844 WerFault.exe 84 4420 5956 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Solara.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86 PID 1844 wrote to memory of 5956 1844 Solara.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"C:\Users\Admin\AppData\Local\Temp\Solara\Solara.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5956 -s 5523⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 8802⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5956 -ip 59561⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1844 -ip 18441⤵PID:4300