#SolarMarker

2024-05-21
Julian-Ferdinand Vögelejulianferdinand@infosec.exchange
2024-05-13

Today we are releasing new research exploring #SolarMarker’s tactics and multi-tiered #infrastructure using various methods, including Network Intelligence.
recordedfuture.com/exploring-t

2024-05-13

It is common for malware to be signed with code signing certificates.

How is this possible? Impostors receive the cert directly and sign malware.

In this blog-post, we look at 100 certs used by #Solarmarker malware to learn more.

squiblydoo.blog/2024/05/13/imp

2024-04-12

eSentire described two incidents today:

Attack chains, IOC and Yara rules provided.

#threatintel #IOC #Xworm #phishing #SolarMarker #PyInstaller

2023-08-21

Low Detection #SolarMarker #Infostealer
#EV #SIGNED LAABAI LTD

This signing name was abused previously by SolarMarker, except it was under a different certificate provider. Most likely the impostor that registered it registered the same name with multiple certificate providers. (See my blog post on this type of behavior if it sounds unfamiliar to you: squiblydoo.blog/2023/05/12/cer)

C2: 146.70.40.228
C2: 212.237.217.133

VT: virustotal.com/gui/file/a01144

MB: bazaar.abuse.ch/sample/fd83469

Backdoor: bazaar.abuse.ch/sample/b44f87a

master_control_program_mcp_@infosec.exchange
2023-07-28

Dug into the #solarmarker #infostealer the past two months and built out this infograph describing the attack chain. Major credit is due to @th3_protoCOL for Intel on this, and definitely read up on squibblydoo's blog post on the malware family as they describe the attack chain fantastically.
squiblydoo.blog/2022/09/27/sol

2023-07-20

I haven't shared our monthly insight here in awhile, so here it is! Red Canary's intel insight for July.

redcanary.com/blog/intelligenc

We saw #YellowCockatoo (aka #SolarMarker ) reappear in a big way. We also had an interesting wave of #Stealc activity, plus a phishing campaign delivering #3losh that then dropped #AsyncRAT

2023-07-14

New #SolarMarker malware! 🌞​

Bing SEO poisoning -> fake website impersonating @internetarchive -> .exe malware (298.09 MB) -> walkymanki[.]com

#IOCs #Malware #CTI
virustotal.com/gui/file/7a8d7d

I used this script for extracting the C2 value from the sample: github.com/RussianPanda95/Conf

Fake website used for malware distribution, themed as the Internet archiveVirusTotal webpage, only 2/66 Vendors detect the file as malwareBing search result with SEO poisoned resultes
2022-12-22

Our monthly Intelligence Insight for December is out!

Highlighted topics this month are #YellowCockatoo (aka #Solarmarker aka #JupyterInfostealer), and recent changes to #Gootloader TTPs.

redcanary.com/blog/intelligenc

2022-12-02

Whoa. You can use OpenAI to deobfuscate #malware. Here's a chunk of old #Solarmarker, which it correctly summarized. #Infosec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst