Behavioral task
behavioral1
Sample
SolaraB/Solara/solarabootstrapper.exe
Resource
win7-20240220-en
General
-
Target
SolaraB.rar
-
Size
76KB
-
MD5
9ad679577500b09d525e224e36667ba4
-
SHA1
e8c8a7afd0c415b94e65e6d0b782852fd0fe508d
-
SHA256
351cba23cab65cd57d5ec9e553bfa02d35a32a8f75467a75b1c3735b87af6a3d
-
SHA512
8f0b245ce641a8912f9c8482c7286bdcf19defd7381f4ee985e0f59701ead1ea134c03816545a9b848b43116afe7da371c2ba6d62b26ccdc5e7b579b68e3c736
-
SSDEEP
1536:zi2l3ISJ6HumuVjcjvlUiKFyTh7hxcj/Z1jY8LkoGFuQ3d:zl3pJjmeQ5URyd7n8/Z1xozFugd
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1258158330237423708/TP4vZ1k1Rh4BbYP62cogAVNmLUNicORrL9xsgCelKxJelwVrWSmY1bVmhh1Yvxap5YQ-
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule static1/unpack001/SolaraB/Solara/solarabootstrapper.exe family_umbral -
Umbral family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/SolaraB/Solara/solarabootstrapper.exe
Files
-
SolaraB.rar.rar
Password: infected
-
SolaraB/Solara/solarabootstrapper.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
tinytask.ini