General
-
Target
SolaraBootstrapper.exe
-
Size
796KB
-
Sample
240614-b4l2lsthkj
-
MD5
26ff62b156d7883ae3a0ce27f0d14418
-
SHA1
56ebc76387a5b4606c5195bb30fabe4f552b0e56
-
SHA256
210175a1675c4afe2d0a6f5d55a49161912d05cb1b636ef531dd9bf0dbbe7da9
-
SHA512
84dab403d2b502f1e478bdf9fd2268336ee0001cc7fffd44e72b381f0eb6c7ee7aa97811977c17c44ece27aa1c1012286f9aa7120869c1695aaa4fa49a93ad8c
-
SSDEEP
12288:KLw1Hh9r38lYoSA9j5lS2hMkTh/c9GtIQwY6n:KL4vrKYoSA9jj8ehmn5
Static task
static1
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
796KB
-
MD5
26ff62b156d7883ae3a0ce27f0d14418
-
SHA1
56ebc76387a5b4606c5195bb30fabe4f552b0e56
-
SHA256
210175a1675c4afe2d0a6f5d55a49161912d05cb1b636ef531dd9bf0dbbe7da9
-
SHA512
84dab403d2b502f1e478bdf9fd2268336ee0001cc7fffd44e72b381f0eb6c7ee7aa97811977c17c44ece27aa1c1012286f9aa7120869c1695aaa4fa49a93ad8c
-
SSDEEP
12288:KLw1Hh9r38lYoSA9j5lS2hMkTh/c9GtIQwY6n:KL4vrKYoSA9jj8ehmn5
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-