General
-
Target
SolaraBootstrapper.exe
-
Size
7.6MB
-
Sample
241129-yzwrksyldn
-
MD5
86c79b9bf602824dfc1bbaa38d01d25e
-
SHA1
8cfaed2028035d84d4e1f4c3b0f7ba74d51e51a1
-
SHA256
1db9b3f057af39e38ad1d051b8b3f0ee98a82bc04f5555e143bee886816d80f1
-
SHA512
78b11d84d89ad435ec33b5bf05b38b8493366b790f8ef810459e7608ff0665965aff7b4af690624808984415dd30e6f57aed9a6b383cb26e5528e311f630fb69
-
SSDEEP
196608:6HHYAWFwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jP:HqIHziK1piXLGVE4Ue0VJD
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
SolaraBootstrapper.exe
-
Size
7.6MB
-
MD5
86c79b9bf602824dfc1bbaa38d01d25e
-
SHA1
8cfaed2028035d84d4e1f4c3b0f7ba74d51e51a1
-
SHA256
1db9b3f057af39e38ad1d051b8b3f0ee98a82bc04f5555e143bee886816d80f1
-
SHA512
78b11d84d89ad435ec33b5bf05b38b8493366b790f8ef810459e7608ff0665965aff7b4af690624808984415dd30e6f57aed9a6b383cb26e5528e311f630fb69
-
SSDEEP
196608:6HHYAWFwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jP:HqIHziK1piXLGVE4Ue0VJD
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3