General

  • Target

    OperaGXSetup.exe

  • Size

    3.2MB

  • Sample

    240223-tc3t6acg72

  • MD5

    d1506efc8e5f3a98f6ac35cbc53e63ff

  • SHA1

    273cd10ee1f49a79754002becfdd8ceaf7746f9e

  • SHA256

    5a012bbf6004fd346cdc00ec9c042cfc83449044372e5fe01471a83e478cd2bd

  • SHA512

    62841a7767dce9d893f62b17fc4857958d25d064b816cd5e959f4a8ab03e5f9cebdcf0023411805b2a7e3bbed7b499a684136b8b9343e9b6baa2f6441f7d1f3f

  • SSDEEP

    98304:yknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVL:yUW/dk4QvIr/laY7GVL

Score
8/10

Malware Config

Targets

    • Target

      OperaGXSetup.exe

    • Size

      3.2MB

    • MD5

      d1506efc8e5f3a98f6ac35cbc53e63ff

    • SHA1

      273cd10ee1f49a79754002becfdd8ceaf7746f9e

    • SHA256

      5a012bbf6004fd346cdc00ec9c042cfc83449044372e5fe01471a83e478cd2bd

    • SHA512

      62841a7767dce9d893f62b17fc4857958d25d064b816cd5e959f4a8ab03e5f9cebdcf0023411805b2a7e3bbed7b499a684136b8b9343e9b6baa2f6441f7d1f3f

    • SSDEEP

      98304:yknNXrW/do46OjQl1GwZOaAGWTpzrBlyWnrHzEBY7GVL:yUW/dk4QvIr/laY7GVL

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks