General

  • Target

    SolaraBootstrapper.exe

  • Size

    104.7MB

  • MD5

    bdbf76228ee4c587b81885e011ce908d

  • SHA1

    24219497fc9b0392558a433341c2220089318bb3

  • SHA256

    675a635c4a4d1a5cb124600b4644f8126b3e5fbfc6e6a42488a664d14f9a6a2c

  • SHA512

    637f6afc11062ccc0065f8db56fcb4a9c413b4338409f5042c41c4a74d478b5e9150bffcf201f12fa5687aeb271422f78c126cdc966a1949016be6b37516593b

  • SSDEEP

    3145728:HZop8S6xjKcBaIc2qHO5iVY2nGQbRe0zJcBWos9U:HZtSWNaIsHCiH1XcBW1

Score
10/10

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBootstrapper.exe
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc