General

  • Target

    TH9Y00qBjEP.zip

  • Size

    8.4MB

  • MD5

    4778edf8277a75c941c54527037c23d5

  • SHA1

    b2e6df4f08e54cf480e7ee280a1eac1699132add

  • SHA256

    47b5923fec8beeb4d0b55ca7ca7839e3bf83a9a804644f014e6bad1d441376c5

  • SHA512

    51ab3cf2726250a02689078617c3ee884b314a844457b52b1d29089d8a22b8fb4ab700ec8f137579557686dcdec5ffc1ed6ff2eb27659d3c5f6192c18bb25515

  • SSDEEP

    196608:hEA4HZIDeVdvkr/c83HdKBxQCNbh8bFOUkrA3FxLuHblfv10hr0E/WY6z4:hEAy3Vpqp39KX1XAZAAFx+h10hp/oM

Score
9/10

Malware Config

Signatures

  • CryptOne packer 1 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • TH9Y00qBjEP.zip
    .zip

    Password: Iq?w3t5

  • README.txt
  • openMe.rar
    .rar

    Password: Iq?w3t5

  • Boostrapper/SolaraBoostrapper.exe
    .exe windows:4 windows x86 arch:x86

    Password: Iq?w3t5

    c05041e01f84e1ccca9c4451f3b6a383


    Headers

    Imports

    Sections

  • $TEMP/Animated
  • $TEMP/Bennett
  • $TEMP/Broker
  • $TEMP/Dell
  • $TEMP/Departments
  • $TEMP/Grow
  • $TEMP/Implementing
  • $TEMP/Int
  • $TEMP/Invalid
  • $TEMP/Italiano
  • $TEMP/Jd
  • $TEMP/Latitude
  • $TEMP/Mailed
  • $TEMP/Manner
  • $TEMP/Matched
  • $TEMP/Nsw
  • $TEMP/Peeing
  • $TEMP/Pitch
  • $TEMP/Portion
  • $TEMP/Pour
  • $TEMP/Quarter
  • $TEMP/Ran
  • $TEMP/Regarding
  • $TEMP/Robinson
  • $TEMP/Roof
  • $TEMP/Roulette
  • $TEMP/Russell
  • $TEMP/Satisfaction
  • $TEMP/Southern
  • $TEMP/Supreme
  • $TEMP/Transparent
  • $TEMP/Une
  • $TEMP/Viii
  • $TEMP/Volt
  • Boostrapper/web
    .dll regsvr32 windows:5 windows x86 arch:x86

    Password: Iq?w3t5

    a9fd3e7f71a802c8eee0a502f46de991


    Code Sign

    Headers

    Imports

    Exports

    Sections