C:\Users\Ashtin\Desktop\WTF\WpfApp1\WpfApp1\obj\x64\Debug\WpfApp1.pdb
Static task
static1
General
-
Target
Solara.exe
-
Size
87KB
-
MD5
c61ea149a799fad804a6b157a48b713a
-
SHA1
36212a1cd7b3cd2d3909d28fcac482977fdc2214
-
SHA256
108c88858bfe52105c794b58d89d423940e7a1a3a2a4502c1a327672defeae09
-
SHA512
5cd298aea469b0d30f84ee04a20077a4bd7ca6c500e07f02d476730442a7e1623dd3ba84615151c949e7966a1fb07c2ea8a14b9aa9086db443051248dded8224
-
SSDEEP
1536:luWT5UfP85Az9I3BbbHVlnOXrPBdfeIScnVl801AbcsqD95wSxdRfBq:luWmn85AxMbb1lnOXrPXe7thq5Z5q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Solara.exe
Files
-
Solara.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ