General

  • Target

    SolaraBootstrapper.exe

  • Size

    1.5MB

  • MD5

    bf4efcac7f1879643d1dbb8cd8aa3b50

  • SHA1

    5496e097495cf774aa92e109cf8fadae443c4b6a

  • SHA256

    5282ca534cfd5b5ab30773135c0e67ee92ecbf5a1607951cd4819ead743f088f

  • SHA512

    188cbe0611e08e446c244aea6f6c95a50481146f7dfa24cb9f9e41816c1cf246d409c4e1d91feced329d1b953c11e7d97f375f4603826ad2f2dbee8de5de144f

  • SSDEEP

    24576:V2G/nvxW3WUmrG7a8813tMJ/ebpn/HtS6eGg/uwY:VbA3GrG7miFIh/tS6W/a

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBootstrapper.exe
    .exe windows:5 windows x86 arch:x86

    Password: 123

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections