MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 15


Intelligence 15 IOCs YARA 12 File information Comments

SHA256 hash: 4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39
SHA3-384 hash: c76241ed6ea28e1c82aca447897f12a27c0ebc2b5214e220ee3fd61b7527fd6a262db30d0bcb560490e452e49605f0d7
SHA1 hash: 4be5647308e0925fb00fae068cb4a89a8a449afc
MD5 hash: 00a1864355a5ea47902e5757c0d87fd9
humanhash: nineteen-harry-pluto-lactose
File name:Solara Bootstrapper.exe
Download: download sample
Signature CoinMiner
File size:10'967'040 bytes
First seen:2025-01-07 15:07:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 196608:NaAEXnVB2t0vW54zu9cQ+6SLwC9tpg9FHh2C32cIPTv3O:NajFECvW5R9ccSLfYHhhbMv3
Threatray 591 similar samples on MalwareBazaar
TLSH T135B6231DD0DCAA8B82FB5338E827396BB56C4191071A9F27745B837B064CBD7D289F48
TrID 30.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
19.7% (.EXE) Win64 Executable (generic) (10522/11/4)
12.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.4% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter aachum
Tags:CoinMiner exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
454
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://mega.nz/file/seMn3LDR#kV4b8EtnCexc4zeeHTcqFUWdURa0K-oy1B91udGVEMo
Verdict:
Malicious activity
Analysis date:
2024-07-15 12:19:14 UTC
Tags:
github

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
coinminer xmrig crypt miner
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Searching for the window
Running batch commands
Deleting a system file
Creating a service
Launching a service
Forced system process termination
Setting browser functions hooks
Unauthorized injection to a recently created process
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed razy
Malware family:
StrelaStealer
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585414 Sample: Solara Bootstrapper.exe Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 87 raw.githubusercontent.com 2->87 89 github.com 2->89 95 Antivirus detection for dropped file 2->95 97 Antivirus / Scanner detection for submitted sample 2->97 99 Multi AV Scanner detection for dropped file 2->99 101 15 other signatures 2->101 10 Solara Bootstrapper.exe 3 2->10         started        14 eejhedztifcv.exe 2->14         started        16 eejhedztifcv.exe 2->16         started        signatures3 process4 file5 81 C:\Users\user\AppData\Local\Temp\kx new.exe, PE32 10->81 dropped 83 C:\Users\user\...\SolaraBootstrapper.exe, PE32 10->83 dropped 127 Encrypted powershell cmdline option found 10->127 18 kx new.exe 3 10->18         started        22 SolaraBootstrapper.exe 15 9 10->22         started        25 powershell.exe 23 10->25         started        129 Multi AV Scanner detection for dropped file 14->129 signatures6 process7 dnsIp8 77 C:\Users\user\AppData\Local\...\xmr new.exe, PE32+ 18->77 dropped 79 C:\Users\user\AppData\...\Kawpow new.exe, PE32+ 18->79 dropped 103 Encrypted powershell cmdline option found 18->103 27 xmr new.exe 18->27         started        30 Kawpow new.exe 1 2 18->30         started        33 powershell.exe 23 18->33         started        91 github.com 140.82.121.3, 443, 49704, 49706 GITHUBUS United States 22->91 93 raw.githubusercontent.com 185.199.109.133, 443, 49705 FASTLYUS Netherlands 22->93 105 Multi AV Scanner detection for dropped file 22->105 35 conhost.exe 22->35         started        107 Loading BitLocker PowerShell Module 25->107 37 conhost.exe 25->37         started        file9 signatures10 process11 file12 131 Modifies the context of a thread in another process (thread injection) 27->131 133 Adds a directory exclusion to Windows Defender 27->133 135 Modifies power options to not sleep / hibernate 27->135 39 dialer.exe 27->39         started        42 powershell.exe 27->42         started        44 cmd.exe 27->44         started        54 11 other processes 27->54 85 C:\ProgramData\...\eejhedztifcv.exe, PE32+ 30->85 dropped 46 dialer.exe 30->46         started        48 powershell.exe 23 30->48         started        50 cmd.exe 30->50         started        56 13 other processes 30->56 137 Loading BitLocker PowerShell Module 33->137 52 conhost.exe 33->52         started        signatures13 process14 signatures15 109 Injects code into the Windows Explorer (explorer.exe) 39->109 111 Writes to foreign memory regions 39->111 113 Allocates memory in foreign processes 39->113 115 Creates a thread in another existing process (thread injection) 39->115 58 lsass.exe 39->58 injected 117 Loading BitLocker PowerShell Module 42->117 61 conhost.exe 42->61         started        63 WmiPrvSE.exe 42->63         started        69 2 other processes 44->69 119 Contains functionality to inject code into remote processes 46->119 121 Injects a PE file into a foreign processes 46->121 123 Contains functionality to compare user and computer (likely to detect sandboxes) 46->123 65 winlogon.exe 46->65 injected 67 conhost.exe 48->67         started        71 2 other processes 50->71 73 11 other processes 54->73 75 13 other processes 56->75 process16 signatures17 125 Writes to foreign memory regions 58->125
Threat name:
Win32.Ransomware.Generic
Status:
Malicious
First seen:
2024-08-18 19:52:34 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery evasion execution persistence
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Obfuscated Files or Information: Command Obfuscation
Power Settings
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Indicator Removal: Clear Windows Event Logs
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Creates new service(s)
Sets service image path in registry
Stops running service(s)
Modifies security service
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a7fecfc225dfdd4e14dcd4d1b4ba1b9f8e4d1984f1cdd8cda3a9987e5d53c239
MD5 hash:
6557bd5240397f026e675afb78544a26
SHA1 hash:
839e683bf68703d373b6eac246f19386bb181713
Detections:
INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
SH256 hash:
4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39
MD5 hash:
00a1864355a5ea47902e5757c0d87fd9
SHA1 hash:
4be5647308e0925fb00fae068cb4a89a8a449afc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

Executable exe 4289002fd7528974ae7a9bf4d855bfd3812d248a46dbd7f94e7336f260ae7a39

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA

Comments