General

  • Target

    Solara_Bootstrapper.exe

  • Size

    18.2MB

  • MD5

    7278d18a763b36d38bf7fe93023ded78

  • SHA1

    37c09218dd68530f340a9ca7ba22ea902b9e0170

  • SHA256

    bcaf4581788b1e7226e769a946043978f4d26bbfe6a1bc1cd97cc5603b1f3c3c

  • SHA512

    17dd62c00479de88dd6d5b66106b8c98b485ba7ddf0fa4d8203ceaa47b63e21b60cc7a90f4b0138e96fe15b49a1869b4d49059e813dad8bbf50967ef07c25b2a

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hPIC:5Zv5PDwbjNrmAE+xIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5MzY4MTEyNTMyMjkyMDAyMg.Gr5spT.I-49BXsI6IIQnmkqZG6Ahb4dE8SoE4Hzo5-CyU

  • server_id

    1293975894108540940

Signatures

  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara_Bootstrapper.exe
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections