C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\bin\Debug\SolaraBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB2/SolaraBootstrapper.exe
Resource
win11-20240611-en
General
-
Target
NiggaSploit.tar
-
Size
800KB
-
MD5
9544ee8281110c3b8afb12746bc473be
-
SHA1
e71aaacac9ed4487c58a04173b605ee0495e6577
-
SHA256
cca449172e36c58ebce3eafb09f47ddfc4cac48d6a869e5d715ecf1fa2117c58
-
SHA512
d45d7d815e80112b93fa9cb8db32ea608bd8769d098eba1a74b9c5a850d87f17600633f61f829771948741f2074932c27bcecde64055a4592e28adc44db4ae96
-
SSDEEP
12288:gfSmzhHoAX5TyQvgwRojAojGdJaTGLLvlguxD:vmzhHWQDRojAojGddLL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/SolaraB2/SolaraBootstrapper.exe
Files
-
NiggaSploit.tar.tar
-
SolaraB2/SolaraBootstrapper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 795KB - Virtual size: 795KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ