General

  • Target

    Solara (infected).zip

  • Size

    1016KB

  • MD5

    2c82076227760fea65c2163381829165

  • SHA1

    014988a0eb52e1cb685ec62a886d9b19a8cf74ca

  • SHA256

    14c9498da64d33d3caf4cac052523c026cf801a6882e8bae165a1ec1929e08bf

  • SHA512

    e8ec3ff3bad6c1141b8d0ef73501e0547b0a57471f437090c9e5af5bfa9471626d31030c4e9d989f2432e86f95865e9dd22baf42ad29f7d94436a1976e1c3da0

  • SSDEEP

    24576:UhVS9HMw/66k0fj/EE9stOo7j2mhu9Vap/w8UvSYl5F0:UhVWHtGijB9uv76mhufi/wB6KF0

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara (infected).zip
    .zip

    Password: infected

  • Solara.exe
    .exe windows:5 windows x86 arch:x86

    Password: infected

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections