General

  • Target

    OperaGXSetup.exe

  • Size

    3.3MB

  • Sample

    230205-bv6dwsba51

  • MD5

    5327e44bc162bf17137c162774cf4c72

  • SHA1

    6753e8d69867c1e2c98732078a33492cca54195b

  • SHA256

    5133bef4419e439869c0721413ff3aec73eeab9f22d6ff3f8f4517342985d83e

  • SHA512

    3968f885743633b01a2b8fe2c887f72825c8949de0393359c89a389ccb36c99e8890caa4ef379bae00f358c27a8875e022c8423987ddcaab0afdb62e54a42d69

  • SSDEEP

    98304:D0ajce7mlMqtf9HgogeLb0IwfytUP5uK5N8xuXlYlmsUC:VcxZf9HEl5uauhN

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.3MB

    • MD5

      5327e44bc162bf17137c162774cf4c72

    • SHA1

      6753e8d69867c1e2c98732078a33492cca54195b

    • SHA256

      5133bef4419e439869c0721413ff3aec73eeab9f22d6ff3f8f4517342985d83e

    • SHA512

      3968f885743633b01a2b8fe2c887f72825c8949de0393359c89a389ccb36c99e8890caa4ef379bae00f358c27a8875e022c8423987ddcaab0afdb62e54a42d69

    • SSDEEP

      98304:D0ajce7mlMqtf9HgogeLb0IwfytUP5uK5N8xuXlYlmsUC:VcxZf9HEl5uauhN

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks