a7f3293b177a63f6c50b5560e729cbff

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date 2024-Jul-26 20:26:36
Debug artifacts C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\bin\Release\Bootstrapper.pdb
Comments
CompanyName
FileDescription SolaraBootstrapper
FileVersion 1.0.0.0
InternalName SolaraBootstrapper.exe
LegalCopyright Copyright © 2024
LegalTrademarks
OriginalFilename SolaraBootstrapper.exe
ProductName SolaraBootstrapper
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: Miscellaneous malware strings:
  • virus
Contains domain names:
  • go.microsoft.com
  • http://james.newtonking.com
  • http://james.newtonking.com/projects/json
  • http://www.w3.org
  • http://www.w3.org/2000/xmlns/
  • https://aka.ms
  • https://go.microsoft.com
  • https://go.microsoft.com/fwlink/p/?LinkId
  • https://pastebin.com
  • https://www.newtonsoft.com
  • https://www.newtonsoft.com/jsonschema
  • https://www.nodejs.org
  • https://www.nodejs.org/dist/v18.16.0/node-v18.16.0-x64.msi
  • https://www.nuget.org
  • https://www.nuget.org/packages/Newtonsoft.Json.Bson
  • james.newtonking.com
  • microsoft.com
  • newtonking.com
  • newtonsoft.com
  • nodejs.org
  • nuget.org
  • pastebin.com
  • www.newtonsoft.com
  • www.nodejs.org
  • www.nuget.org
  • www.w3.org
Malicious VirusTotal score: 24/75 (Scanned on 2024-07-26 22:48:43) APEX: Malicious
Bkav: W32.AIDetectMalware.CS
CrowdStrike: win/malicious_confidence_70% (D)
DeepInstinct: MALICIOUS
Elastic: malicious (high confidence)
Google: Detected
Ikarus: Trojan-Downloader.MSIL.Agent
Kaspersky: HEUR:Backdoor.MSIL.Remcos.gen
Kingsoft: MSIL.Backdoor.Remcos.gen
Lionic: Trojan.Win32.Remcos.m!c
Malwarebytes: RiskWare.GameHack
MaxSecure: Trojan.Malware.300983.susgen
McAfeeD: ti!DA17868F1079
Microsoft: Trojan:Win32/Wacatac.B!ml
Rising: Backdoor.Remcos!8.B89E (CLOUD)
Sangfor: Backdoor.Win32.Remcos.Vb82
Sophos: Mal/Generic-S
Symantec: ML.Attribute.HighConfidence
VBA32: Downloader.MSIL.Pabin.Heur
VirIT: Trojan.Win32.MSIL_Heur.A
Webroot: W32.Adware.Gen
ZoneAlarm: HEUR:Backdoor.MSIL.Remcos.gen
alibabacloud: Backdoor:MSIL/Remcos.gyf
huorong: TrojanDownloader/MSIL.Pstinb.a

Hashes

MD5 a7f3293b177a63f6c50b5560e729cbff
SHA1 4885073e4881cffc5c5155de720aa65755418fe8
SHA256 da17868f107954124c0953fd1cb37ac8ed4e78460905e83d6402b966a77ee7dc
SHA3 7fefc249c4c7137d3f93c9a8793aa30b491f16b7350a0ad98d29aec134b50a23
SSDeep 12288:Hs0xF36Z1LyI6QQsJNOoRQ1jt/Nppxu29CHWzO:xxJ6Z1L5J8oRQ1jt/Nppxv9C2
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2024-Jul-26 20:26:36
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 8.0
SizeOfCode 0xc6200
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000C80B2 (Section: .text)
BaseOfCode 0x2000
BaseOfData 0xca000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0xce000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_CUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 cce4c84d026bc3d6219f8f72871b053f
SHA1 7dfd334c6a72406716e57e0ea353132dac55ae0e
SHA256 316e984cf1ef8975e0f6c77460035c706d2d1b5c0fc9c2132858c99b792dcd50
SHA3 479ce77061a8b14b8751fba84ccc727b317f945d49802b2e695cb0aa02d0ffa2
VirtualSize 0xc615b
VirtualAddress 0x2000
SizeOfRawData 0xc6200
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.60859

.rsrc

MD5 706ed0398f1aa324656eb5102ff400cf
SHA1 293330ed29fcff995fe2aa792e86e7ee1c2a84ce
SHA256 0d8c311342041f6e7c4d960315c24a56a8ee39143f1890ecdf772f6aa90371b3
SHA3 6bb15db202b73fa3b6e6b9b6e7c41449ff96ea41515951050826ca2ed846adfd
VirtualSize 0x575
VirtualAddress 0xca000
SizeOfRawData 0x600
PointerToRawData 0xc6400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.77069

.reloc

MD5 ee1b7a70aa9f8f1d61ca65965e4e12d3
SHA1 0c06ecc5ab7cd7ffc33c0450109020b68ad66dfc
SHA256 96f51e13fc3ac20c18e9f019f3edcfb7aa83502f66820c956d35f79adbdfd1ad
SHA3 8f3f7a567c7d22578e7f303d270f8f60f2c7e6422dc97ff7415028f034caef53
VirtualSize 0xc
VirtualAddress 0xcc000
SizeOfRawData 0x200
PointerToRawData 0xc6a00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0980042

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x36c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.22436
MD5 ef5a2773c8482660f9abe976ac5684b7
SHA1 c7d0259f2e7595a43426aca46fb5988504e47afa
SHA256 29079a72cf0b93457c4c1069d2019ef115658e8e1c2e6a846b489f608aba701c
SHA3 20ebb6d87ec350cd83e9888329f5d3df3475e2c71ed8f4fa998993f3bf6d75a8

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x169
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00403
MD5 3a054402c80f2cd19b9f510e076c27f7
SHA1 28a626213db62f65c2461b254e7c1e110c339309
SHA256 b04cd0eff378f76e3a3ab2183c05b84c523a79707a664b8353fb73eab41963e8
SHA3 6f7ad01c5817f146bffdde4d4ce833b145cb9b2401670e63f61ee329e81c887d

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription SolaraBootstrapper
FileVersion (#2) 1.0.0.0
InternalName SolaraBootstrapper.exe
LegalCopyright Copyright © 2024
LegalTrademarks
OriginalFilename SolaraBootstrapper.exe
ProductName SolaraBootstrapper
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2024-Jul-26 20:26:36
Version 0.0
SizeofData 119
AddressOfRawData 0xc80e4
PointerToRawData 0xc62e4
Referenced File C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\bin\Release\Bootstrapper.pdb

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->