General

  • Target

    SolaraBootstrapper.exe

  • Size

    796KB

  • Sample

    240614-b4l2lsthkj

  • MD5

    26ff62b156d7883ae3a0ce27f0d14418

  • SHA1

    56ebc76387a5b4606c5195bb30fabe4f552b0e56

  • SHA256

    210175a1675c4afe2d0a6f5d55a49161912d05cb1b636ef531dd9bf0dbbe7da9

  • SHA512

    84dab403d2b502f1e478bdf9fd2268336ee0001cc7fffd44e72b381f0eb6c7ee7aa97811977c17c44ece27aa1c1012286f9aa7120869c1695aaa4fa49a93ad8c

  • SSDEEP

    12288:KLw1Hh9r38lYoSA9j5lS2hMkTh/c9GtIQwY6n:KL4vrKYoSA9jj8ehmn5

Score
7/10

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      796KB

    • MD5

      26ff62b156d7883ae3a0ce27f0d14418

    • SHA1

      56ebc76387a5b4606c5195bb30fabe4f552b0e56

    • SHA256

      210175a1675c4afe2d0a6f5d55a49161912d05cb1b636ef531dd9bf0dbbe7da9

    • SHA512

      84dab403d2b502f1e478bdf9fd2268336ee0001cc7fffd44e72b381f0eb6c7ee7aa97811977c17c44ece27aa1c1012286f9aa7120869c1695aaa4fa49a93ad8c

    • SSDEEP

      12288:KLw1Hh9r38lYoSA9j5lS2hMkTh/c9GtIQwY6n:KL4vrKYoSA9jj8ehmn5

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks