General

  • Target

    SolaraBootstrapper.exe

  • Size

    9.5MB

  • MD5

    81cc5781eddb3eac7b5ba88706a43cd8

  • SHA1

    34db4fa4cb034f23586027fa59867058a0f79d23

  • SHA256

    f9492af3afb78775082e480af744d660db9da8bc33c3ff63d869abf62d900f6e

  • SHA512

    f2bf7b780a13ecbf5d684c015c94ced7936ad8dc8437f775ea4bf63d47890ec7907f975de95dade487ef2512b8dcef067239454782fd2b32db1631f4d23d9ac4

  • SSDEEP

    196608:1E7JB0tYrXLW+d7UcIxptvyUQymRDSI1WCOK53Ie:1E9B0OjrdLK4J/tIe

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBootstrapper.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections