General
-
Target
SolaraBootstrapper.exe
-
Size
3.2MB
-
Sample
240812-1hfp5swbnc
-
MD5
a9f17939e061e0511410aaf77087b02d
-
SHA1
554dc5ce2b0af194364833ea517a4089794fe97e
-
SHA256
19b98f9d5364599c870fa967e544634a635c358b3ed7208d5fc563c95a26e7e2
-
SHA512
4320694375b559ddcb6722d445e9509076f384271aa4445116f5b72a824a33df0aad1d29354b046964050a9676ce6e04e806046870064fe9b70512d99896adc4
-
SSDEEP
24576:7u+wImf9OPXCQYpd0naDrvqjo44E9gzfyYVGSyF+ZjyFJX/oekGTP/JCF1eQ8uW:TO9OPXCYPD4mgRVIJ/vNQ8
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
3.2MB
-
MD5
a9f17939e061e0511410aaf77087b02d
-
SHA1
554dc5ce2b0af194364833ea517a4089794fe97e
-
SHA256
19b98f9d5364599c870fa967e544634a635c358b3ed7208d5fc563c95a26e7e2
-
SHA512
4320694375b559ddcb6722d445e9509076f384271aa4445116f5b72a824a33df0aad1d29354b046964050a9676ce6e04e806046870064fe9b70512d99896adc4
-
SSDEEP
24576:7u+wImf9OPXCQYpd0naDrvqjo44E9gzfyYVGSyF+ZjyFJX/oekGTP/JCF1eQ8uW:TO9OPXCYPD4mgRVIJ/vNQ8
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-