General

  • Target

    Solara Excutor.exe

  • Size

    1.8MB

  • MD5

    8afce716afc2c8a1c53f65be81951bfd

  • SHA1

    837f71086e9d4387169a96a66ab22e6143cca964

  • SHA256

    7470676ed865542f393c21a847338863f97b913e0c40ef6120fe7b84e046085d

  • SHA512

    f26f6fe5741643f4d4fa2f09d7ac46b95d364551c394f0acebde97e1d46f943669f51e7e4374a207a84c65ea77264e962d5014e450a648170efcb8a4390ec0c3

  • SSDEEP

    24576:l2G/nvxW3WbN2TZwZQNUlqbqtBbRVdEeX2x1nRdjms3c0yP6tpHavuWeGqC2XnG:lbA3w2lwFlT5GdxZXU6tMmWcW

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara Excutor.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections