Threat Database Ransomware Solara Ransomware

Solara Ransomware

Solara is a recently observed ransomware strain that researchers say is built on the publicly circulated Chaos family code. Ransomware like Solara encrypts user files, demands payment, and can permanently disrupt access to important data, so protecting devices and backups is essential. 

WHAT SOLARA DOES

During analysis, Solara was observed encrypting files and appending the text string '.solara' to filenames (for example, '1.png' → '1.png.solara'). The malware also drops a ransom note named 'read_it.txt' that claims the victim triggered an 'anti-crack' protection and instructs victims to obtain a decryption tool from an online actor. Several write-ups and sample analyses link Solara to the Chaos ransomware family and describe similar behavior (encryption, extension substitution, and a plaintext ransom note). 

RANSOM NOTE & PAYMENT CLAIMS

The ransom message examined by analysts asserts that file recovery is 'nearly impossible' without the attacker's decryption tool. The note instructs victims to contact a Discord user (xenqxd) and suggests payment options such as Paysafecard (in Poland) or a small Bitcoin amount. Notably, some samples omit meaningful contact channels, which can indicate an immature or prank-like campaign, or operators who simply don't expect to negotiate. Treat all such demands with extreme suspicion. 

CAN YOU RECOVER FILES WITHOUT PAYING?

In general, files encrypted by Chaos-family threats are not recoverable without the proper decryption key. If you have clean, offline backups from before the infection, restoring them is the safest recommended route. Paying is discouraged, criminals often don't deliver usable decryptors, and paying funds further criminal activity. 

COMMON INFECTION VECTORS

  • Pirated software, keygens, and 'cracked' utilities disguised with malware.
  • Malicious email attachments and links (Office macros, scripts, EXEs).
  • Infected ads, compromised or unofficial download sites, P2P/torrent networks, USB drives, and third-party downloaders. 

IMMEDIATE ACTIONS IF YOU SUSPECT INFECTION

Isolate the machine immediately: disconnect from networks (wired/wifi) and unmount any shared/network drives to stop lateral spread.

Preserve evidence: do not power-cycle if you are collecting memory or forensic artifacts, instead capture memory and disk images if you have the capability, or call incident response.

Use backups: Restore from trusted backups once the malware is removed and systems are rebuilt; do not restore backups that may have been connected at the time of infection.

Do not pay unless an incident response team has assessed all options and consequences; payment is not guaranteed to work and may encourage future attacks. 

BEST SECURITY PRACTICES 

Maintain an up-to-date, layered defense that includes the following practices in daily operations:

Patch management: apply OS and application security updates promptly; many ransomware strains exploit known and patched vulnerabilities. 

Least privilege and account hygiene: run users with non-admin accounts, enforce strong multifactor authentication for remote access and privileged accounts, and monitor for unusual login behavior. 

Backup strategy: Create backups regularly and keep them separate from the network. After all, backups are the single most effective recovery control against encryption attacks. 

Endpoint protection and EDR: deploy reputable endpoint detection & response solutions that can detect execution anomalies, block malicious payloads, and enable rapid containment. Keep signatures and telemetry enabled. 

User education and phishing resistance: train users to avoid running cracks/keygens, to verify email senders and links, and to treat unexpected attachments with suspicion. Simulated phishing and awareness campaigns reduce the human risk factor. 

Application controls and macro restrictions: disable Office macros by default, block execution from common abuse locations (e.g., %AppData%, temp folders), and use application allow-listing where feasible. 

CLOSING NOTES

Solara illustrates common risks tied to publicly available ransomware builders: forks and variants proliferate, and attackers continually adapt distribution methods to target specific communities (reports highlight gaming forums and pirated-software channels as likely lures). The best defenses are prevention, strong backups, rapid containment, and working with trained response teams, not paying ransoms. If you suspect compromise and need step-by-step cleanup help, collect sample indicators (file names, hashes, ransom note text) and consult a trusted incident response provider or your security vendor for containment and recovery guidance.

Messages

The following messages associated with Solara Ransomware were found:

Oh uh, your pc was hacked by Solara Ransomware!

How can i recover my files?
Almost no way! You tried to crack our software!

How did this happen?
You flagged our anti crack and your HWID wasn't in our database!

Can i actually recover my PC?
Not really, only if you buy the decryption software from xenqxd on discord [he didn't make this anti crack, he has the decryption software]

What methods do you accept?
In poland - paysafecard [50 PLN]
Or 5 dollars in bitcoin

Trending

Most Viewed

Loading...