General

  • Target

    OperaGXSetup (1).exe

  • Size

    3.2MB

  • Sample

    240203-s4fy2afbaq

  • MD5

    ab6419c58ac077ff46587edb91eb0868

  • SHA1

    eb7572ed8172318d6a33ca1d0c783fc0e5ce8d99

  • SHA256

    fc50b4f235fac069c23411a8cc848d66c237a2be9800ffd3985128847efad3e6

  • SHA512

    a3c83815a4c5215c7ccebd5f6b7247240049bb3a460207ffbd5c18e149268db7b7719948ec12bc8a101b9a9fc22feb8ce6c0dcb97d82d5d25da57ff5216624f5

  • SSDEEP

    98304:rknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVg:rUW/dk4QvIr/laY7GVg

Score
7/10

Malware Config

Targets

    • Target

      OperaGXSetup (1).exe

    • Size

      3.2MB

    • MD5

      ab6419c58ac077ff46587edb91eb0868

    • SHA1

      eb7572ed8172318d6a33ca1d0c783fc0e5ce8d99

    • SHA256

      fc50b4f235fac069c23411a8cc848d66c237a2be9800ffd3985128847efad3e6

    • SHA512

      a3c83815a4c5215c7ccebd5f6b7247240049bb3a460207ffbd5c18e149268db7b7719948ec12bc8a101b9a9fc22feb8ce6c0dcb97d82d5d25da57ff5216624f5

    • SSDEEP

      98304:rknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVg:rUW/dk4QvIr/laY7GVg

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks