C:\Users\Ashtin\Desktop\WTF\WpfApp1\WpfApp1\obj\x64\Debug\WpfApp1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win10v2004-20240426-en
General
-
Target
Solara.exe
-
Size
56KB
-
MD5
c3256c5f0046841c566b77f0c86eedd8
-
SHA1
48ab4b19274e8bb4859236e73e8e2ce3b6957c59
-
SHA256
d51b22a5d11d05453349ef55d319f950f6b1d05ecb3c6d4f34f3f2d2dc55c63c
-
SHA512
cb5a224f26aade0499ca0fbc6cabe2f348eaed86812e8f5b1b271019744830dbba46544ba7d974af404fcd556f487f790affa814aae6cbd6946bb935d3de37f2
-
SSDEEP
1536:737AWl5dISnKrl801AbcsqD95wSxdRfC:737AWl5d75hq5ZK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Solara.exe
Files
-
Solara.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ