General

  • Target

    OperaGXSetup.exe

  • Size

    3.4MB

  • Sample

    230328-j1c9asbe7v

  • MD5

    2ab1c313bb4630629f25b7b5e2c77564

  • SHA1

    aa55c60e58dbb88e8ddf12595536904757a00d74

  • SHA256

    1139de78debd0f579c819344207cb2e3cab899370b0f4003cbbe8640c569dfc3

  • SHA512

    ad7476d1a1c457a8712aabb602a9168e998940734dbd52fa3fc556e29896f61781cc56acbb2fbb4122acb53a7a3faef3fac1433771fcfae8c4a2294839efed30

  • SSDEEP

    98304:OE5YW5FJdsCsCI+LE0T/zw8SK1rg6g+Xwp0387sYfBoV5ZyQ77:OUY+CCsMQ1+Xv8A5TVP

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.4MB

    • MD5

      2ab1c313bb4630629f25b7b5e2c77564

    • SHA1

      aa55c60e58dbb88e8ddf12595536904757a00d74

    • SHA256

      1139de78debd0f579c819344207cb2e3cab899370b0f4003cbbe8640c569dfc3

    • SHA512

      ad7476d1a1c457a8712aabb602a9168e998940734dbd52fa3fc556e29896f61781cc56acbb2fbb4122acb53a7a3faef3fac1433771fcfae8c4a2294839efed30

    • SSDEEP

      98304:OE5YW5FJdsCsCI+LE0T/zw8SK1rg6g+Xwp0387sYfBoV5ZyQ77:OUY+CCsMQ1+Xv8A5TVP

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks