General

  • Target

    solarabootstraper.exe.exe

  • Size

    7.8MB

  • Sample

    250414-vdk66stnw3

  • MD5

    4b5fbdbc403470858ad75164591e0aa4

  • SHA1

    f50a3ca7b352c96faad8ded354f1c59bef294ec1

  • SHA256

    825e43df561cd104d6c985bdcde6f18be5790f0e0657fd29413e3ca53cb6f4d4

  • SHA512

    16bb3ccec46fdbe64227ac199c5c3f8d03c429b5640d8168ac8ac75ffb8d38d94f7a4b6d37eea23dc6d24669a23b87e7efc85753c846af3e6eac9132a3a8f039

  • SSDEEP

    196608:QWD6HUOXXKAp5/hUzj9fZwQRCgiIKpdzjPOan7j2y283TOnO1:0xrhEw8wIKppDO9i1

Malware Config

Targets

    • Target

      solarabootstraper.exe.exe

    • Size

      7.8MB

    • MD5

      4b5fbdbc403470858ad75164591e0aa4

    • SHA1

      f50a3ca7b352c96faad8ded354f1c59bef294ec1

    • SHA256

      825e43df561cd104d6c985bdcde6f18be5790f0e0657fd29413e3ca53cb6f4d4

    • SHA512

      16bb3ccec46fdbe64227ac199c5c3f8d03c429b5640d8168ac8ac75ffb8d38d94f7a4b6d37eea23dc6d24669a23b87e7efc85753c846af3e6eac9132a3a8f039

    • SSDEEP

      196608:QWD6HUOXXKAp5/hUzj9fZwQRCgiIKpdzjPOan7j2y283TOnO1:0xrhEw8wIKppDO9i1

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      k���kWU.pyc

    • Size

      1KB

    • MD5

      dc84db103305daf09eb447643b305213

    • SHA1

      844f205993efa70476c43edecbb4f92f0bec485f

    • SHA256

      298387813501e38b2789da15b92b70a6eef9d79c9a97c88c8937c037aa05679c

    • SHA512

      d2af6ddb083142b4fc640962e0b0023a6cf67ac788b6be25a318835d5052c293f4160eef84ce2a47605a2f9d45a28558b115186e9f9adcab4b8d5e4fc1eab3b5

    Score
    1/10

MITRE ATT&CK Enterprise v16

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.