General

  • Target

    SolaraBootstrapper.exe

  • Size

    20.6MB

  • Sample

    240526-zkwcyabe9z

  • MD5

    85e8c5acfc113792ea950f0f9974dde6

  • SHA1

    b98fd74d3e1f9277ba3fbdf70821c41bd8b553aa

  • SHA256

    6b5bc20646f1d8c2b40dcaa0d716d6fa8aa25589c54043cf0fa547a21d10fcf4

  • SHA512

    9e86d41b77de5e5290b3e66d75c620a2ca86d8166474ca743948b62e186d350433eecbd5c6c7212cdce24bf11d5ee7213127ecbd773ad9112af507747afeb021

  • SSDEEP

    393216:1o9DM45Ct55L1V8dkurEUWj+rM6EGPKSUuK+:a9NMXRndbmM64S7K+

Score
7/10

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      20.6MB

    • MD5

      85e8c5acfc113792ea950f0f9974dde6

    • SHA1

      b98fd74d3e1f9277ba3fbdf70821c41bd8b553aa

    • SHA256

      6b5bc20646f1d8c2b40dcaa0d716d6fa8aa25589c54043cf0fa547a21d10fcf4

    • SHA512

      9e86d41b77de5e5290b3e66d75c620a2ca86d8166474ca743948b62e186d350433eecbd5c6c7212cdce24bf11d5ee7213127ecbd773ad9112af507747afeb021

    • SSDEEP

      393216:1o9DM45Ct55L1V8dkurEUWj+rM6EGPKSUuK+:a9NMXRndbmM64S7K+

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks