General
-
Target
OperaGXSetup.exe
-
Size
3.2MB
-
Sample
240218-1gfzhsfc83
-
MD5
c8a2d9b247396e9f42aea4f81e9f200c
-
SHA1
a39c9a91213367c7ec636dcb609270a7718aad1c
-
SHA256
81247a94a420242d476f719a3c8147710a05b1aab46e0d9bf8cfce897751b318
-
SHA512
68a8272fbf228a7981c784d0ad85286ca744d31fcadd26b65f35b0f428efe7caa7a49d3e26a5f95a8ea4e567199633eda54002e5cc20c380600791f4024c1ddf
-
SSDEEP
98304:u0YQE4tiwbOdJd2RTOH42LpuJK1/OGuaPClvzX19zWwZ6:vPiwbOdLECJkMOTWv
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win11-20240214-en
Behavioral task
behavioral2
Sample
out.exe
Resource
win11-20240214-en
Malware Config
Targets
-
-
Target
OperaGXSetup.exe
-
Size
3.2MB
-
MD5
c8a2d9b247396e9f42aea4f81e9f200c
-
SHA1
a39c9a91213367c7ec636dcb609270a7718aad1c
-
SHA256
81247a94a420242d476f719a3c8147710a05b1aab46e0d9bf8cfce897751b318
-
SHA512
68a8272fbf228a7981c784d0ad85286ca744d31fcadd26b65f35b0f428efe7caa7a49d3e26a5f95a8ea4e567199633eda54002e5cc20c380600791f4024c1ddf
-
SSDEEP
98304:u0YQE4tiwbOdJd2RTOH42LpuJK1/OGuaPClvzX19zWwZ6:vPiwbOdLECJkMOTWv
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
out.upx
-
Size
5.4MB
-
MD5
c5d3af22cc572b4b028807f3c6147aba
-
SHA1
361ee1d8253d6c0c7bff7c5b04877f78a06979e5
-
SHA256
27e0deee05a3f9465b6982538ac7a2521a73ac2df857cb88e481373d2cc83ce1
-
SHA512
ae13cf57e01381eed16b4ea9ce8e8b29271f54333d8aa33a7e334847576ffad3fff1b44be86c61d97753c1a4926942a8a7c8e4ffa2b8b0729cbd1d1c0d954ba1
-
SSDEEP
98304:Qntld6666666666666666666666666666666x666666666666666fwwwwwwwwwwR:6O995NmPY8xDCaaCo8PNgI6Zta2gqLfS
Score3/10 -