rule Solaris_Malware meta: description = "Detects solaris.exe malware" strings: $s1 = "SolarisClient" wide ascii $s2 = "C2_Domain_Check" ascii $s3 = 8B 45 08 83 F8 02 74 1C // anti-debug stub condition: uint16(0) == 0x5A4D and (any of ($s*)) and filesize < 2MB
| Variant | SHA-256 | |---------|---------| | Miner variant | a1b2c3d4e5f6... (64 chars) | | RAT variant | b2c3d4e5f6a1... | | Downloader variant | c3d4e5f6a1b2... | solaris.exe
For real-time analysis, upload any suspected solaris.exe sample to , Any.Run , or Joe Sandbox . This paper is based on aggregated threat reports up to mid-2025. For active incidents, consult latest TI feeds from Mandiant, CrowdStrike, or Microsoft Security Intelligence. rule Solaris_Malware meta: description = "Detects solaris