General

  • Target

    Solara-bootstrapper.exe

  • Size

    79KB

  • MD5

    27ebfad218fb0aa838e6d47eab6a9533

  • SHA1

    1edb7ed2a89257c00368a22f016a0bdfb12646b9

  • SHA256

    1eb678dfda8eb5317baaeb7abfa97e003c882002e673b952fe01061209bbb194

  • SHA512

    22f971eaab400fc6bd98d11db252f821230827f9921e60b17de382d82082be932ade9008418368b1071953b205219cfe913e12e248a517477952301a316abf37

  • SSDEEP

    1536:NZnPlVtVCLqlPuWWD3ViN81Xby8rliJF6DOfQL5y2h:DPlX8GlPnKCAXbyEiwOfg5Ph

Score
10/10

Malware Config

Extracted

Family

xworm

C2

else-treatment.gl.at.ply.gg:31932

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    USB.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara-bootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections