General

  • Target

    SolaraBootstrapper.exe

  • Size

    279KB

  • MD5

    580dd32c33bf5ec13692dc160b2a3a98

  • SHA1

    8ba0d7dc695d75801a6169ab9b41130a3b305595

  • SHA256

    e2360b23a592c13f932142f87605559201de852fdbd1ba9ca218e4d7a04e45b8

  • SHA512

    7bfbe253971aeab2271fdda1e04f6cdd91e0166da51502ff509f794b4e97cfd0637d8ce2cc64e3b28cdde610032c69bb5f07d244f1cb848f178fd0dd3aacdf3b

  • SSDEEP

    3072:zn+bNARnVa9+be16ZDOYUxiLvAzII9x66AOag74srxxVfPWKvQIFY623:NRzbDyzqONxTGqQI+62

Score
10/10

Malware Config

Extracted

Family

xworm

C2

22.ip.gl.ply.gg:5299

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 1 IoCs
  • Xworm family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SolaraBootstrapper.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections