General
-
Target
OperaGXSetup.exe
-
Size
3.4MB
-
Sample
240305-zaq1gagf3t
-
MD5
b16754e31096ff084460514287187a29
-
SHA1
149d9d7bc7bfa0ee218e55eb3778ea3cf6184dc7
-
SHA256
ada1f60b55545c1f8a59fd28d2a5fd37d9655e9f059857121e1d493fada33750
-
SHA512
86fad8a6ee5660aac5a0fa172d6094585793cc6b86996941211292a9e91fc2571c8fa807a3021561909c841491400991f152f18c8e1d247c663ff600643224f7
-
SSDEEP
98304:TWo5jp/vdcY8uC+gOhUL+byztZXlAuoVGmKeLEcjXXV9bA:TP59/VcYZCOW+bO+5Eo9c
Malware Config
Targets
-
-
Target
OperaGXSetup.exe
-
Size
3.4MB
-
MD5
b16754e31096ff084460514287187a29
-
SHA1
149d9d7bc7bfa0ee218e55eb3778ea3cf6184dc7
-
SHA256
ada1f60b55545c1f8a59fd28d2a5fd37d9655e9f059857121e1d493fada33750
-
SHA512
86fad8a6ee5660aac5a0fa172d6094585793cc6b86996941211292a9e91fc2571c8fa807a3021561909c841491400991f152f18c8e1d247c663ff600643224f7
-
SSDEEP
98304:TWo5jp/vdcY8uC+gOhUL+byztZXlAuoVGmKeLEcjXXV9bA:TP59/VcYZCOW+bO+5Eo9c
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-