C:\Users\Пользователь\Desktop\44CALIBER-main\44CALIBER\obj\Debug\SolaraBootstrapper.pdb
General
-
Target
SolaraBootstrapper.exe
-
Size
304KB
-
MD5
57e127da218cf91a3bd38b177099edad
-
SHA1
40138b9611a8bc7dddc94bccd6d3847ca8ab881d
-
SHA256
470914ddf3d824016ea5d00527b72f28e848ba4ef5cc48fc2d8ec65ca8d1f50d
-
SHA512
55978686bdf56f7a9f1e9209d77494320390cb6ee5175de728028a7602e1e4c7624196eb5c6b8735f4b4b15dd132d1df8491d166f832580c6a2abeec460b4ef4
-
SSDEEP
6144:q/oT6MDdbICydeBrdEGHpcJWba23UVt3QA8e0F5B:q/WJEGHpQWeGUVtj8eUB
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1259774804534497342/8EZmH3dK1jU0Q5PXQDVD0hawjscINRdEpoQ85BKJvoPo3stGWAfUJE7lZN4wJCUTHdnG
Signatures
-
44caliber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource SolaraBootstrapper.exe
Files
-
SolaraBootstrapper.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ