General

  • Target

    OperaGXSetup.exe

  • Size

    3.4MB

  • Sample

    231011-khe6lsbf5s

  • MD5

    9e06ea51ef2947ca7a023919492fd87f

  • SHA1

    6a290487abc153516b8b11df382235452457385e

  • SHA256

    559195c61dc7b7908c664ced18434d19b824e2cf5075badafbad9d49f41196f0

  • SHA512

    d7fdd4005a22234b5e7a5fa951eee40c07ff2b6e08b49575137e944d0c68cc9ea0ae80c9a5a87b8679108b678ead526404d52f1bd2a78a138b5801a298574205

  • SSDEEP

    98304:RTR2CwAtHVu8sO2IaUSa1gAQi/LKFxJgk+bMWPR1s6XAvV2:dR2CwO1u8jpfIvcbLz

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.4MB

    • MD5

      9e06ea51ef2947ca7a023919492fd87f

    • SHA1

      6a290487abc153516b8b11df382235452457385e

    • SHA256

      559195c61dc7b7908c664ced18434d19b824e2cf5075badafbad9d49f41196f0

    • SHA512

      d7fdd4005a22234b5e7a5fa951eee40c07ff2b6e08b49575137e944d0c68cc9ea0ae80c9a5a87b8679108b678ead526404d52f1bd2a78a138b5801a298574205

    • SSDEEP

      98304:RTR2CwAtHVu8sO2IaUSa1gAQi/LKFxJgk+bMWPR1s6XAvV2:dR2CwO1u8jpfIvcbLz

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks