General

  • Target

    OperaGXSetup (2).exe

  • Size

    3.4MB

  • Sample

    231107-qz9dnseh5x

  • MD5

    79518a48e0605d2ea341f1aa6a574e8f

  • SHA1

    0882db2bc0097b475c7223dd3718acf063218444

  • SHA256

    2a5407e3c6e47936b2f44402111680585eeaa77e069d44170cc25bfeea0af847

  • SHA512

    e83769b463e435b7f90159e1f8cf239eff3746c10a01fe5c89126db02fabc2a1212101fca79d681d0c20a017bb592c1142e29b6927b0c50998450547f4fca47e

  • SSDEEP

    98304:MWPbERK55V/LpH3e9NQarN0gHMOlDjoxHsc2JS9mihr+DywoS0yBBx9pjm:PbERK5VlGSarNLHzCWmTyfs

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup (2).exe

    • Size

      3.4MB

    • MD5

      79518a48e0605d2ea341f1aa6a574e8f

    • SHA1

      0882db2bc0097b475c7223dd3718acf063218444

    • SHA256

      2a5407e3c6e47936b2f44402111680585eeaa77e069d44170cc25bfeea0af847

    • SHA512

      e83769b463e435b7f90159e1f8cf239eff3746c10a01fe5c89126db02fabc2a1212101fca79d681d0c20a017bb592c1142e29b6927b0c50998450547f4fca47e

    • SSDEEP

      98304:MWPbERK55V/LpH3e9NQarN0gHMOlDjoxHsc2JS9mihr+DywoS0yBBx9pjm:PbERK5VlGSarNLHzCWmTyfs

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks