General

  • Target

    SolaraBootstrapper.exe

  • Size

    9.5MB

  • MD5

    42cd418e50599036f45acf1e639fb132

  • SHA1

    708932af15b8b01349f37adb246206408b22d807

  • SHA256

    7147f433db58190a7b35946752424a8e95fb7e45a3c6f4c1b24abc029c69bbcf

  • SHA512

    f4243c7ffbb7fe2b9717a995f8f65c16b518d336db2b2556a44d7396558f3246f650b5166a69019adead424d2c78bb09a651436cae9034fb6f1cced3e23a1326

  • SSDEEP

    196608:gwCE7JB0tYrXLW+d7UcIxptvyUQymRDSI1WCOK5l:gwCE9B0OjrdLK4J/7

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBootstrapper.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections