General

  • Target

    Solara.exe

  • Size

    1.7MB

  • MD5

    5f3d44c744cb0df6d22e23f4209fa3bb

  • SHA1

    00506991d8ca49961b08cf24184c8dd17140ee11

  • SHA256

    a2e4cf8b213164c1e954baf69cd8c8bce5ee9ceedbbd711f5d7015a063b4f453

  • SHA512

    eda9806c9a3f209a01d0ab8254bbb7531838a2cc82150faf4c5f58dd6e8b417020e78e36eb3f7e316150dd664148842879d40512f7e5f93b515e5b56256f6243

  • SSDEEP

    49152:fbA3jr/VnpOIkfIUMVmWmxW2bqZAz3/gRTw:fbar/VnYIm6X52bqZ03/Iw

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections