Resubmissions
05/08/2024, 20:11
240805-yyhtbs1blb 10General
-
Target
SolaraBootstrapper.exe
-
Size
30.0MB
-
Sample
240805-yyhtbs1blb
-
MD5
8def6d80db11ec36bdf5f86f6de3316b
-
SHA1
399fd854999b014a26818e09ba2a0f5a6ce9ff58
-
SHA256
35662500e31d085d460b306293ac426efa47b97dae45f3778906076913944e31
-
SHA512
6242f2854f9791af8c24c07f86a7f5816c781e1928e19759fda4e01d67a044b197e3f3215a957ca45a6561f7453cfa256a07f0bcb59534febd5afedc3e8a3230
-
SSDEEP
786432:Y9Z9OAQD7vD+szcY87WGhySW8MCNrZpC3dC:6vhQD7v/E7WGhySWINrZpq
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
30.0MB
-
MD5
8def6d80db11ec36bdf5f86f6de3316b
-
SHA1
399fd854999b014a26818e09ba2a0f5a6ce9ff58
-
SHA256
35662500e31d085d460b306293ac426efa47b97dae45f3778906076913944e31
-
SHA512
6242f2854f9791af8c24c07f86a7f5816c781e1928e19759fda4e01d67a044b197e3f3215a957ca45a6561f7453cfa256a07f0bcb59534febd5afedc3e8a3230
-
SSDEEP
786432:Y9Z9OAQD7vD+szcY87WGhySW8MCNrZpC3dC:6vhQD7v/E7WGhySWINrZpq
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-