C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
SolaraB/Solara/SolaraBootstrapper.exe
Resource
win10v2004-20240611-en
General
-
Target
240614-xkkv4awepk_pw_infected.zip
-
Size
5KB
-
MD5
6c649a1a183e5ae97417595969dd3427
-
SHA1
c46fc1d50af9ffaf34c8c1464498047375b18319
-
SHA256
995f909500dc96e3be14081aee475ac5ed545df7e2cfa0f0e4f0590b3c242882
-
SHA512
d43886c514eb42f28348ee738f726369e913bf10278ea76baac5741941c11173c438921e0fc6f55c93b341b7bcd41004057ab176c452f555a0abadebe7479582
-
SSDEEP
96:Z439fAJNhY8IX02dm6EhNnLcHpqIsqvVIXetEqLR/9/EC0Hn/1bsriMG:69Q37IX06BEhGHpxIXqLHcC0Hn/1UiMG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack002/SolaraB/Solara/SolaraBootstrapper.exe
Files
-
240614-xkkv4awepk_pw_infected.zip.zip
Password: infected
-
SolaraB.zip.zip
Password: infected
-
SolaraB/Solara/SolaraBootstrapper.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ