General

  • Target

    solara fixed.exe

  • Size

    42KB

  • MD5

    ba7260927235f92f78eff5e8e82da1af

  • SHA1

    d82d5a28d0b0f688385e0478c8bbdaaa3bffbcef

  • SHA256

    c0cb117746fb41754067205ef04f88d9f51212825678a9761dd96604a0118bb2

  • SHA512

    a4bd2f5c6f15d8925a40ae0dc5567ad26fbee22f3e0357ff8d4e7b4784097eecd48fbfed22ec49d87d5a70f4c7e6bf30ae1c1362e3bf0265461826ce5bdb40ee

  • SSDEEP

    768:i4oUyLvnDylOcIuZnLO0YTj0KZKfgm3EhO+:GdjnD9cBLOtTgF7Es+

Score
10/10

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1293675192106877011/uBYdl54QTqHJ58vFoe-OKreDxwD-f3D8N0iSVRM5Z9ASoc5jOxeIG-rwdBs7sGK59emG

Signatures

  • Mercurialgrabber family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • solara fixed.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections