C:\Users\moret\Desktop\SolaraBootSRC\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SolaraKarma.exe
Resource
win10v2004-20240226-en
General
-
Target
SolaraKarma.exe
-
Size
13KB
-
MD5
039696783b8c26ce62c658325e309345
-
SHA1
ea33372da3bd6694d475e42aa644689328bc12b2
-
SHA256
c416c738b03a067d92b780ca7de18fe8c89296ba0220416a2291a61b764df2bd
-
SHA512
48162079405e7e94fde83d3889801f6cbac6db5cb6f5dbcadea13c4309db83630b2b05af1383c640c9bf2d71d90152be2b56a6f9b138b3fe2b2a4b115802aa66
-
SSDEEP
192:9nrY1+or62eaV1LaqaLHmr/XKT8ifVTJ1Mk1VXwNjA:9nrY1V22eanaqayzK4ifH1DV0j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SolaraKarma.exe
Files
-
SolaraKarma.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ