Behavioral task
behavioral1
Sample
SolaraB.exe
Resource
win11-20240709-en
General
-
Target
SolaraB.exe
-
Size
78KB
-
MD5
7d9783a23f84206f2e5f83cc020f3339
-
SHA1
5d4e5122cac946766db4ad62dec9a38ac0c440f0
-
SHA256
cf5f5f7b6931de3ca12d8ba0628a7a7fbade9666f28b5399636e9b7462ffc77a
-
SHA512
af4a184d2fd23ed06b3fee32be763b1e13558f957634cf5f0183c3330aebe3f05ebea077f2348dfdbaf537c3c494ad5f1292ed7ce7cf71ffd8bd4adbc1b47dc5
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0NjEzNDA1Nzg1MTY4Njk4NA.GRF2kh.kub45g__zske6ArznkMfWRakUQokgM9wnBNeco
-
server_id
1246129266614210684
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SolaraB.exe
Files
-
SolaraB.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ