General

  • Target

    SolaraBootstrapper.exe

  • Size

    797KB

  • Sample

    240630-p8xwka1fnp

  • MD5

    36b62ba7d1b5e149a2c297f11e0417ee

  • SHA1

    ce1b828476274375e632542c4842a6b002955603

  • SHA256

    8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c

  • SHA512

    fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94

  • SSDEEP

    12288:n1mzgHpbzEu8AgpQojA1j855xU9pHIRxSNN:1mzgH385QojA1j855xSHI

Score
7/10

Malware Config

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      797KB

    • MD5

      36b62ba7d1b5e149a2c297f11e0417ee

    • SHA1

      ce1b828476274375e632542c4842a6b002955603

    • SHA256

      8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c

    • SHA512

      fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94

    • SSDEEP

      12288:n1mzgHpbzEu8AgpQojA1j855xU9pHIRxSNN:1mzgH385QojA1j855xSHI

    Score
    7/10
    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks