General
-
Target
OperaGXSetup (1).exe
-
Size
3.2MB
-
Sample
240203-s4fy2afbaq
-
MD5
ab6419c58ac077ff46587edb91eb0868
-
SHA1
eb7572ed8172318d6a33ca1d0c783fc0e5ce8d99
-
SHA256
fc50b4f235fac069c23411a8cc848d66c237a2be9800ffd3985128847efad3e6
-
SHA512
a3c83815a4c5215c7ccebd5f6b7247240049bb3a460207ffbd5c18e149268db7b7719948ec12bc8a101b9a9fc22feb8ce6c0dcb97d82d5d25da57ff5216624f5
-
SSDEEP
98304:rknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVg:rUW/dk4QvIr/laY7GVg
Malware Config
Targets
-
-
Target
OperaGXSetup (1).exe
-
Size
3.2MB
-
MD5
ab6419c58ac077ff46587edb91eb0868
-
SHA1
eb7572ed8172318d6a33ca1d0c783fc0e5ce8d99
-
SHA256
fc50b4f235fac069c23411a8cc848d66c237a2be9800ffd3985128847efad3e6
-
SHA512
a3c83815a4c5215c7ccebd5f6b7247240049bb3a460207ffbd5c18e149268db7b7719948ec12bc8a101b9a9fc22feb8ce6c0dcb97d82d5d25da57ff5216624f5
-
SSDEEP
98304:rknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVg:rUW/dk4QvIr/laY7GVg
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-