General

  • Target

    SolaraBootstrapper.exe

  • Size

    969KB

  • Sample

    240824-k9jywavenn

  • MD5

    b8a07270ae910250a280a14eee35b80f

  • SHA1

    c4c4a15fb067d11324c028cb36fbd4cb04cb26ce

  • SHA256

    49a4a4641cbffaafce34a35cd4c74d486935db28906fc4acd71400f26d853cd0

  • SHA512

    c1fda7adb3324c3e697124520b50d852a1e7b3d238d2f7fb23311c4767de3babc6a4653f901e91a4d4fdf6fde3c464b0299a3b986875fb38dad16d036c3020b2

  • SSDEEP

    24576:zYmtbhG5rt/PmeggdP8/L52miMaCn5FNF:bkxt/OeZP8/NDiMLTN

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      969KB

    • MD5

      b8a07270ae910250a280a14eee35b80f

    • SHA1

      c4c4a15fb067d11324c028cb36fbd4cb04cb26ce

    • SHA256

      49a4a4641cbffaafce34a35cd4c74d486935db28906fc4acd71400f26d853cd0

    • SHA512

      c1fda7adb3324c3e697124520b50d852a1e7b3d238d2f7fb23311c4767de3babc6a4653f901e91a4d4fdf6fde3c464b0299a3b986875fb38dad16d036c3020b2

    • SSDEEP

      24576:zYmtbhG5rt/PmeggdP8/L52miMaCn5FNF:bkxt/OeZP8/NDiMLTN

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks