General
-
Target
solarabootstraper.exe.exe
-
Size
7.8MB
-
Sample
250414-vdk66stnw3
-
MD5
4b5fbdbc403470858ad75164591e0aa4
-
SHA1
f50a3ca7b352c96faad8ded354f1c59bef294ec1
-
SHA256
825e43df561cd104d6c985bdcde6f18be5790f0e0657fd29413e3ca53cb6f4d4
-
SHA512
16bb3ccec46fdbe64227ac199c5c3f8d03c429b5640d8168ac8ac75ffb8d38d94f7a4b6d37eea23dc6d24669a23b87e7efc85753c846af3e6eac9132a3a8f039
-
SSDEEP
196608:QWD6HUOXXKAp5/hUzj9fZwQRCgiIKpdzjPOan7j2y283TOnO1:0xrhEw8wIKppDO9i1
Behavioral task
behavioral1
Sample
solarabootstraper.exe
Resource
win11-20250410-en
Behavioral task
behavioral2
Sample
k���kWU.pyc
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
solarabootstraper.exe.exe
-
Size
7.8MB
-
MD5
4b5fbdbc403470858ad75164591e0aa4
-
SHA1
f50a3ca7b352c96faad8ded354f1c59bef294ec1
-
SHA256
825e43df561cd104d6c985bdcde6f18be5790f0e0657fd29413e3ca53cb6f4d4
-
SHA512
16bb3ccec46fdbe64227ac199c5c3f8d03c429b5640d8168ac8ac75ffb8d38d94f7a4b6d37eea23dc6d24669a23b87e7efc85753c846af3e6eac9132a3a8f039
-
SSDEEP
196608:QWD6HUOXXKAp5/hUzj9fZwQRCgiIKpdzjPOan7j2y283TOnO1:0xrhEw8wIKppDO9i1
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
k���kWU.pyc
-
Size
1KB
-
MD5
dc84db103305daf09eb447643b305213
-
SHA1
844f205993efa70476c43edecbb4f92f0bec485f
-
SHA256
298387813501e38b2789da15b92b70a6eef9d79c9a97c88c8937c037aa05679c
-
SHA512
d2af6ddb083142b4fc640962e0b0023a6cf67ac788b6be25a318835d5052c293f4160eef84ce2a47605a2f9d45a28558b115186e9f9adcab4b8d5e4fc1eab3b5
Score1/10 -
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3